{"id":"CVE-2016-9401","details":"popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.","modified":"2026-04-16T06:17:39.596877200Z","published":"2017-01-23T21:59:02.987Z","related":["SUSE-SU-2017:1317-1","SUSE-SU-2017:1337-1","openSUSE-SU-2024:10106-1"],"references":[{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-02"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0725.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/11/17/5"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/11/17/9"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94398"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1931"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00028.html"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4"}]},{"events":[{"introduced":"0"},{"last_affected":"4.4-patch1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.4-patch2"}]},{"events":[{"introduced":"0"},{"last_affected":"4.4-patch3"}]},{"events":[{"introduced":"0"},{"last_affected":"4.4-patch4"}]},{"events":[{"introduced":"0"},{"last_affected":"4.4-patch5"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.5"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-9401.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}