First published: Sun Sep 28 2014(Updated: )
The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Bash | =1.14.0 | |
GNU Bash | =1.14.1 | |
GNU Bash | =1.14.2 | |
GNU Bash | =1.14.3 | |
GNU Bash | =1.14.4 | |
GNU Bash | =1.14.5 | |
GNU Bash | =1.14.6 | |
GNU Bash | =1.14.7 | |
GNU Bash | =2.0 | |
GNU Bash | =2.01 | |
GNU Bash | =2.01.1 | |
GNU Bash | =2.02 | |
GNU Bash | =2.02.1 | |
GNU Bash | =2.03 | |
GNU Bash | =2.04 | |
GNU Bash | =2.05 | |
GNU Bash | =2.05-a | |
GNU Bash | =2.05-b | |
GNU Bash | =3.0 | |
GNU Bash | =3.0.16 | |
GNU Bash | =3.1 | |
GNU Bash | =3.2 | |
GNU Bash | =3.2.48 | |
GNU Bash | =4.0 | |
GNU Bash | =4.0-rc1 | |
GNU Bash | =4.1 | |
GNU Bash | =4.2 | |
GNU Bash | =4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.