CVE Vulnerabilities

CVE-2016-9401

Use After Free

Published: Jan 23, 2017 | Modified: Aug 06, 2025
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
1.9 LOW
AV:L/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
3.3 LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Ubuntu
NEGLIGIBLE
root.io logo minimus.io logo echo.ai logo

popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.

Weakness

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory “belongs” to the code that operates on the new pointer.

Affected Software

NameVendorStart VersionEnd Version
BashGnu*4.4 (excluding)
BashGnu4.4-patch1 (including)4.4-patch1 (including)
BashGnu4.4-patch2 (including)4.4-patch2 (including)
BashGnu4.4-patch3 (including)4.4-patch3 (including)
BashGnu4.4-patch4 (including)4.4-patch4 (including)
BashGnu4.4-patch5 (including)4.4-patch5 (including)
Red Hat Enterprise Linux 6RedHatbash-0:4.1.2-48.el6*
Red Hat Enterprise Linux 7RedHatbash-0:4.2.46-28.el7*
BashUbuntuartful*
BashUbuntubionic*
BashUbuntucosmic*
BashUbuntudevel*
BashUbuntudisco*
BashUbuntueoan*
BashUbuntuesm-infra-legacy/trusty*
BashUbuntuesm-infra/bionic*
BashUbuntuesm-infra/focal*
BashUbuntuesm-infra/xenial*
BashUbuntufocal*
BashUbuntugroovy*
BashUbuntuhirsute*
BashUbuntuprecise*
BashUbuntuprecise/esm*
BashUbuntutrusty*
BashUbuntutrusty/esm*
BashUbuntuvivid/stable-phone-overlay*
BashUbuntuvivid/ubuntu-core*
BashUbuntuxenial*
BashUbuntuyakkety*
BashUbuntuzesty*

Potential Mitigations

References