Updated zsh packages fix security vulnerabilities
Publication date: 14 Mar 2018Modification date: 14 Mar 2018
Type: security
Affected Mageia releases : 6
CVE: CVE-2017-18205 , CVE-2017-18206 , CVE-2018-7548 , CVE-2018-7549
Description
Zsh has been updated to fix 4 security issues. In builtin.c in zsh before 5.4, when sh compatibility mode is used, there is a NULL pointer dereference during processing of the cd command with no argument if HOME is not set. (CVE-2017-18205) In utils.c in zsh before 5.4, symlink expansion had a buffer overflow. (CVE-2017-18206) In subst.c in zsh through 5.4.2, there is a NULL pointer dereference when using ${(PA)...} on an empty array result.(CVE-2018-7548) In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p. (CVE-2018-7549)
References
- https://bugs.mageia.org/show_bug.cgi?id=22741
- https://usn.ubuntu.com/3593-1/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18205
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18206
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7548
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7549
SRPMS
6/core
- zsh-5.3.1-1.2.mga6