Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 649614 (CVE-2017-18205, CVE-2017-18206, CVE-2018-1071, CVE-2018-7548, CVE-2018-7549)

Summary: <app-shells/zsh-5.4.2: multiple vulnerabilities
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Severity: normal CC: polynomial-c, radhermit
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: B3 [glsa+ cve]
Package list:
Runtime testing required: ---
Bug Depends on: 651860    
Bug Blocks:    

Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2018-03-21 00:25:59 UTC
CVE-2018-7549 (
  In params.c in zsh through 5.4.2, there is a crash during a copy of an empty
  hash table, as demonstrated by typeset -p.

CVE-2018-7548 (
  In subst.c in zsh through 5.4.2, there is a NULL pointer dereference when
  using ${(PA)...} on an empty array result.

CVE-2018-1071 (
  zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in
  the exec.c:hashcmd() function. A local attacker could exploit this to cause
  a denial of service.

CVE-2017-18206 (
  In utils.c in zsh before 5.4, symlink expansion had a buffer overflow.

CVE-2017-18205 (
  In builtin.c in zsh before 5.4, when sh compatibility mode is used, there is
  a NULL pointer dereference during processing of the cd command with no
  argument if HOME is not set.
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2018-05-26 15:41:52 UTC
This issue was resolved and addressed in
 GLSA 201805-10 at
by GLSA coordinator Christopher Diaz Riveros (chrisadr).