First published: Tue Feb 27 2018(Updated: )
A flaw was found in zsh prior 5.0.7. There is a buffer overflow for very long fds in >& fd syntax. References: <a href="https://sourceforge.net/p/zsh/code/ci/49a3086bb67575435251c70ee598e2fd406ef055">https://sourceforge.net/p/zsh/code/ci/49a3086bb67575435251c70ee598e2fd406ef055</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zsh Zsh | <5.0.7 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
redhat/zsh | <5.0.7 | 5.0.7 |
debian/zsh | 5.8-6+deb11u1 5.9-4 5.9-8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2014-10071.
The severity of CVE-2014-10071 is critical with a severity value of 9.8.
The software affected by CVE-2014-10071 includes zsh versions before 5.0.7.
To fix CVE-2014-10071, update zsh to version 5.0.7 or later.
You can find more information about CVE-2014-10071 at the following references: [Reference 1](https://sourceforge.net/p/zsh/code/ci/49a3086bb67575435251c70ee598e2fd406ef055), [Reference 2](https://usn.ubuntu.com/3593-1/), [Reference 3](https://access.redhat.com/errata/RHSA-2018:3073).