[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1304-1] zsh security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : zsh
Version        : 4.3.17-1+deb7u1
CVE IDs        : CVE-2014-10070 CVE-2014-10071 CVE-2014-10072
                 CVE-2016-10714 CVE-2017-18206

It was discovered that there were multiple vulnerabilities in the
"zsh" shell:

  * CVE-2014-10070: Fix a privilege-elevation issue if the
    environment has not been properly sanitized.

  * CVE-2014-10071: Prevent a buffer overflow for very long file
  * descriptors in the ">& fd" syntax.

  * CVE-2014-10072: Correct a buffer overflow when scanning very long
    directory paths for symbolic links.

  * CVE-2016-10714: Fix an off-by-one error that was resulting in
    undersized buffers that were intended to support PATH_MAX.

  * CVE-2017-18206: Fix a buffer overflow in symlink expansion.


For Debian 7 "Wheezy", this issue has been fixed in zsh version
4.3.17-1+deb7u1.

We recommend that you upgrade your zsh packages.


Regards,

- -- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      lamby@debian.org / chris-lamb.co.uk
       `-

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAlqivesACgkQHpU+J9Qx
HlhTBQ/9HHTv266KYfy8tHjGGPAcg1MnNWp/LebpCAu7biEB6MxcaOXWh1CSyxNF
3FZcJ8oG/5GnMzTgJyAjp9o553NIdO+S/0O57634zM489Ei2unqlYprwaoU2naYF
J+NssrZ8ALvuE4ULQw4dgrCC4kPPX/Kas2cKICmJFcpZlgR349GPbw4Nc9fOj898
NdX+WB2Ou/5SnrgFcRzDWpZSUwPVSunmU2AI48NfEwMvf3DIoLEZBJupY1MGuNSQ
8VXem0Geqo6AgCaNrkz7T3fDcRVzIAWMRjVZRMcwQ/d5XWqEmA9ks2R1XhDUgL//
CGOdy7JquOixJK5BPyhxH+9kcF7IybAxamgAU5kuJLHBS95x99JnO07fDOwgG6JP
0YZyFVHQWMjbb5nXVYTk4MW4I6KSX5ioqElNDaFT/A/rH7Fw0YAAPIH7VAXxxE1K
aRhzzEAf+B09sefBGXtlDq+dX97W88s4Nzr4MWVrfNH0pVLJGMrw4zOpcpV6J4A6
T3NciA/1saXTHd1fKrkFGmB1rv+XKU1nvwQlhySpzbo/D8MKjHh22whdFoPpWWOx
tRyUfUMIjFMBoCQwA3rceuCiqNYwCR83s9Pck+cAG6L39SOvnafZzg2PZh3qxXbj
Ut55l0TX+opysC0l+HLeQaponiH8EzlwcTQOvsCOK4ZsDPvGDhI=
=peC3
-----END PGP SIGNATURE-----


Reply to: