{"id":"UBUNTU-CVE-2016-9401","details":"popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.","modified":"2026-01-30T00:54:50.106200Z","published":"2017-01-23T00:00:00Z","related":["USN-3294-1"],"upstream":["CVE-2016-9401"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9401"},{"type":"REPORT","url":"http://www.openwall.com/lists/oss-security/2016/11/17/5"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3294-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2016-9401"}],"affected":[{"package":{"name":"bash","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/bash@4.3-7ubuntu1.7?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.3-7ubuntu1.7"}]}],"versions":["4.2-5ubuntu3","4.3-1ubuntu2","4.3-2ubuntu1","4.3-3ubuntu1","4.3-4ubuntu1","4.3-4ubuntu2","4.3-6ubuntu1","4.3-7ubuntu1","4.3-7ubuntu1.1","4.3-7ubuntu1.2","4.3-7ubuntu1.3","4.3-7ubuntu1.4","4.3-7ubuntu1.5","4.3-7ubuntu1.6"],"ecosystem_specific":{"binaries":[{"binary_name":"bash","binary_version":"4.3-7ubuntu1.7"},{"binary_name":"bash-builtins","binary_version":"4.3-7ubuntu1.7"},{"binary_name":"bash-static","binary_version":"4.3-7ubuntu1.7"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-9401.json"}},{"package":{"name":"bash","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/bash@4.3-14ubuntu1.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.3-14ubuntu1.2"}]}],"versions":["4.3-14ubuntu1","4.3-14ubuntu1.1"],"ecosystem_specific":{"binaries":[{"binary_name":"bash","binary_version":"4.3-14ubuntu1.2"},{"binary_name":"bash-builtins","binary_version":"4.3-14ubuntu1.2"},{"binary_name":"bash-static","binary_version":"4.3-14ubuntu1.2"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-9401.json"}},{"package":{"name":"bash","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/bash@4.4-5ubuntu1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4-5ubuntu1"}]}],"ecosystem_specific":{"binaries":[{"binary_name":"bash","binary_version":"4.4-5ubuntu1"},{"binary_name":"bash-builtins","binary_version":"4.4-5ubuntu1"},{"binary_name":"bash-static","binary_version":"4.4-5ubuntu1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-9401.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"negligible"}]}