Hi Img,
Yes the fix for 9.1 is available in 9.4 train but this issue is impacting when there is web management access enabled, so you may use workaround by Enabling command authorization which prevents exploitation of this vulnerability.
Enabling command authorization significantly changes the way that the Cisco ASA interprets privilege levels and authorizes actions. Before enabling the feature, administrators must clearly define which actions are allowed per privilege level using the privilege command in global configuration mode. Administrators should not enable command authorization using the aaa authorization command command until they have defined these actions.