Описание
The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 4.4-2ubuntu1 |
| bionic | not-affected | 4.4-2ubuntu1 |
| cosmic | not-affected | 4.4-2ubuntu1 |
| devel | not-affected | 4.4-2ubuntu1 |
| disco | not-affected | 4.4-2ubuntu1 |
| eoan | not-affected | 4.4-2ubuntu1 |
| esm-infra-legacy/trusty | released | 4.3-7ubuntu1.7 |
| esm-infra/bionic | not-affected | 4.4-2ubuntu1 |
| esm-infra/focal | not-affected | 4.4-2ubuntu1 |
| esm-infra/xenial | released | 4.3-14ubuntu1.2 |
Показывать по
EPSS
6 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.
The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.
The expansion of '\h' in the prompt string in bash 4.3 allows remote a ...
The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.
EPSS
6 Medium
CVSS2
7.5 High
CVSS3