USN-3593-1: Zsh vulnerabilities

08 March 2018

Several security issues were fixed in Zsh.

Releases

Packages

  • zsh - shell with lots of features

Details

It was discovered that Zsh incorrectly handled certain enviroment variables.
An attacker could possibly use this issue to gain privileged access to the
system. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-10070)

It was discovered that Zsh incorrectly handled certain inputs.
An attacker could possibly use this to execute arbitrary code. This
issue only affected Ubuntu 14.04 LTS. (CVE-2014-10071)

It was discovered that Zsh incorrectly handled some symbolic links.
An attacker could possibly use this to execute arbitrary code. This issue
only affected Ubuntu 14.04 LTS. (CVE-2014-10072)

It was discovered that Zsh incorrectly handled certain errors. An attacker
could possibly use this issue to cause a denial of service. (CVE-2016-10714)

It was discovered that Zsh incorrectly handled certain commands. An attacker
could possibly use this to execute arbitrary code. (CVE-2017-18205)

It was discovered that Zsh incorrectly handled certain symlinks. An attacker
could possibly use this to execute arbitrary code. This issue only affected
Ubuntu 16.04 LTS and Ubuntu 17.10. (CVE-2017-18206)

It was discovered that Zsh incorrectly handled certain inputs. An attacker could
possible use to execute arbitrary code. This issue only affected Ubuntu 17.10.
(CVE-2018-7548)

It was discovered that Zsh incorrectly handled certain inputs. An attacker
could possibly use this to cause a denial of service. (CVE-2018-7549)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10
Ubuntu 16.04
Ubuntu 14.04

After a standard system update you need to restart Zsh to make
all the necessary changes.