Описание
Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
| Релиз | Статус | Примечание | 
|---|---|---|
| devel | released  | 4.3-9ubuntu4 | 
| esm-infra-legacy/trusty | released  | 4.3-7ubuntu1.4 | 
| lucid | released  | 4.1-2ubuntu3.4 | 
| precise | released  | 4.2-2ubuntu2.5 | 
| trusty | released  | 4.3-7ubuntu1.4 | 
| trusty/esm | released  | 4.3-7ubuntu1.4 | 
| upstream | needs-triage  | 
Показывать по
10 Critical
CVSS2
Связанные уязвимости
Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
Off-by-one error in the read_token_word function in parse.y in GNU Bas ...
Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
Уязвимость интерпретатора командной строки GNU Bash, позволяющая злоумышленнику вызвать отказ в обслуживании или выполнить произвольный код
10 Critical
CVSS2