Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 649614 (CVE-2017-18205, CVE-2017-18206, CVE-2018-1071, CVE-2018-7548, CVE-2018-7549) - <app-shells/zsh-5.4.2: multiple vulnerabilities
Summary: <app-shells/zsh-5.4.2: multiple vulnerabilities
Status: RESOLVED FIXED
Alias: CVE-2017-18205, CVE-2017-18206, CVE-2018-1071, CVE-2018-7548, CVE-2018-7549
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL:
Whiteboard: B3 [glsa+ cve]
Keywords:
Depends on: CVE-2018-1083
Blocks:
  Show dependency tree
 
Reported: 2018-03-05 09:19 UTC by Agostino Sarubbo
Modified: 2018-05-26 15:41 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2018-03-21 00:25:59 UTC
CVE-2018-7549 (https://nvd.nist.gov/vuln/detail/CVE-2018-7549):
  In params.c in zsh through 5.4.2, there is a crash during a copy of an empty
  hash table, as demonstrated by typeset -p.

CVE-2018-7548 (https://nvd.nist.gov/vuln/detail/CVE-2018-7548):
  In subst.c in zsh through 5.4.2, there is a NULL pointer dereference when
  using ${(PA)...} on an empty array result.

CVE-2018-1071 (https://nvd.nist.gov/vuln/detail/CVE-2018-1071):
  zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in
  the exec.c:hashcmd() function. A local attacker could exploit this to cause
  a denial of service.

CVE-2017-18206 (https://nvd.nist.gov/vuln/detail/CVE-2017-18206):
  In utils.c in zsh before 5.4, symlink expansion had a buffer overflow.

CVE-2017-18205 (https://nvd.nist.gov/vuln/detail/CVE-2017-18205):
  In builtin.c in zsh before 5.4, when sh compatibility mode is used, there is
  a NULL pointer dereference during processing of the cd command with no
  argument if HOME is not set.
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2018-05-26 15:41:52 UTC
This issue was resolved and addressed in
 GLSA 201805-10 at https://security.gentoo.org/glsa/201805-10
by GLSA coordinator Christopher Diaz Riveros (chrisadr).