Updated zsh packages fix security vulnerabilities
Publication date: 14 Mar 2018Modification date: 14 Mar 2018
Type: security
Affected Mageia releases : 6
CVE: CVE-2017-18205 , CVE-2017-18206 , CVE-2018-7548 , CVE-2018-7549
Description
Zsh has been updated to fix 4 security issues.
In builtin.c in zsh before 5.4, when sh compatibility mode is used, there is a
NULL pointer dereference during processing of the cd command with no argument if
HOME is not set. (CVE-2017-18205)
In utils.c in zsh before 5.4, symlink expansion had a buffer overflow.
(CVE-2017-18206)
In subst.c in zsh through 5.4.2, there is a NULL pointer dereference when using
${(PA)...} on an empty array result.(CVE-2018-7548)
In params.c in zsh through 5.4.2, there is a crash during a copy of an empty
hash table, as demonstrated by typeset -p. (CVE-2018-7549)
References
- https://bugs.mageia.org/show_bug.cgi?id=22741
- https://usn.ubuntu.com/3593-1/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18205
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18206
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7548
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7549
SRPMS
6/core
- zsh-5.3.1-1.2.mga6