-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : zsh Version : 4.3.17-1+deb7u1 CVE IDs : CVE-2014-10070 CVE-2014-10071 CVE-2014-10072 CVE-2016-10714 CVE-2017-18206
It was discovered that there were multiple vulnerabilities in the "zsh" shell: * CVE-2014-10070: Fix a privilege-elevation issue if the environment has not been properly sanitized. * CVE-2014-10071: Prevent a buffer overflow for very long file * descriptors in the ">& fd" syntax. * CVE-2014-10072: Correct a buffer overflow when scanning very long directory paths for symbolic links. * CVE-2016-10714: Fix an off-by-one error that was resulting in undersized buffers that were intended to support PATH_MAX. * CVE-2017-18206: Fix a buffer overflow in symlink expansion. For Debian 7 "Wheezy", this issue has been fixed in zsh version 4.3.17-1+deb7u1. We recommend that you upgrade your zsh packages. Regards, - -- ,''`. : :' : Chris Lamb `. `'` la...@debian.org / chris-lamb.co.uk `- -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAlqivesACgkQHpU+J9Qx HlhTBQ/9HHTv266KYfy8tHjGGPAcg1MnNWp/LebpCAu7biEB6MxcaOXWh1CSyxNF 3FZcJ8oG/5GnMzTgJyAjp9o553NIdO+S/0O57634zM489Ei2unqlYprwaoU2naYF J+NssrZ8ALvuE4ULQw4dgrCC4kPPX/Kas2cKICmJFcpZlgR349GPbw4Nc9fOj898 NdX+WB2Ou/5SnrgFcRzDWpZSUwPVSunmU2AI48NfEwMvf3DIoLEZBJupY1MGuNSQ 8VXem0Geqo6AgCaNrkz7T3fDcRVzIAWMRjVZRMcwQ/d5XWqEmA9ks2R1XhDUgL// CGOdy7JquOixJK5BPyhxH+9kcF7IybAxamgAU5kuJLHBS95x99JnO07fDOwgG6JP 0YZyFVHQWMjbb5nXVYTk4MW4I6KSX5ioqElNDaFT/A/rH7Fw0YAAPIH7VAXxxE1K aRhzzEAf+B09sefBGXtlDq+dX97W88s4Nzr4MWVrfNH0pVLJGMrw4zOpcpV6J4A6 T3NciA/1saXTHd1fKrkFGmB1rv+XKU1nvwQlhySpzbo/D8MKjHh22whdFoPpWWOx tRyUfUMIjFMBoCQwA3rceuCiqNYwCR83s9Pck+cAG6L39SOvnafZzg2PZh3qxXbj Ut55l0TX+opysC0l+HLeQaponiH8EzlwcTQOvsCOK4ZsDPvGDhI= =peC3 -----END PGP SIGNATURE-----