[SECURITY] [DLA 1304-1] zsh security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Package : zsh
Version : 4.3.17-1+deb7u1
CVE IDs : CVE-2014-10070 CVE-2014-10071 CVE-2014-10072
CVE-2016-10714 CVE-2017-18206
It was discovered that there were multiple vulnerabilities in the
"zsh" shell:
* CVE-2014-10070: Fix a privilege-elevation issue if the
environment has not been properly sanitized.
* CVE-2014-10071: Prevent a buffer overflow for very long file
* descriptors in the ">& fd" syntax.
* CVE-2014-10072: Correct a buffer overflow when scanning very long
directory paths for symbolic links.
* CVE-2016-10714: Fix an off-by-one error that was resulting in
undersized buffers that were intended to support PATH_MAX.
* CVE-2017-18206: Fix a buffer overflow in symlink expansion.
For Debian 7 "Wheezy", this issue has been fixed in zsh version
4.3.17-1+deb7u1.
We recommend that you upgrade your zsh packages.
Regards,
- --
,''`.
: :' : Chris Lamb
`. `'` lamby@debian.org / chris-lamb.co.uk
`-
-----BEGIN PGP SIGNATURE-----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=peC3
-----END PGP SIGNATURE-----
Reply to: