Package        : zsh
Version        : 4.3.17-1+deb7u1
CVE IDs        : CVE-2014-10070 CVE-2014-10071 CVE-2014-10072
                 CVE-2016-10714 CVE-2017-18206

It was discovered that there were multiple vulnerabilities in the
"zsh" shell:

  * CVE-2014-10070: Fix a privilege-elevation issue if the
    environment has not been properly sanitized.

  * CVE-2014-10071: Prevent a buffer overflow for very long file
  * descriptors in the ">& fd" syntax.

  * CVE-2014-10072: Correct a buffer overflow when scanning very long
    directory paths for symbolic links.

  * CVE-2016-10714: Fix an off-by-one error that was resulting in
    undersized buffers that were intended to support PATH_MAX.

  * CVE-2017-18206: Fix a buffer overflow in symlink expansion.


For Debian 7 "Wheezy", this issue has been fixed in zsh version
4.3.17-1+deb7u1.

We recommend that you upgrade your zsh packages.


Regards,

- -- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      lamby@debian.org / chris-lamb.co.uk
       `-

Debian LTS: DLA-1304-1: zsh security update

March 9, 2018
It was discovered that there were multiple vulnerabilities in the "zsh" shell: * CVE-2014-10070: Fix a privilege-elevation issue if the

Summary

* CVE-2014-10071: Prevent a buffer overflow for very long file
* descriptors in the ">& fd" syntax.

* CVE-2014-10072: Correct a buffer overflow when scanning very long
directory paths for symbolic links.

* CVE-2016-10714: Fix an off-by-one error that was resulting in
undersized buffers that were intended to support PATH_MAX.

* CVE-2017-18206: Fix a buffer overflow in symlink expansion.


For Debian 7 "Wheezy", this issue has been fixed in zsh version
4.3.17-1+deb7u1.

We recommend that you upgrade your zsh packages.


Regards,

- --
,''`.
: :' : Chris Lamb
`. `'` lamby@debian.org / chris-lamb.co.uk
`-



Severity
Package : zsh
Version : 4.3.17-1+deb7u1

Related News