First published: Tue Feb 27 2018(Updated: )
A flaw was found in zsh. There is a buffer overflow when scanning very long directory paths for symbolic links. References: <a href="https://sourceforge.net/p/zsh/code/ci/3e06aeabd8a9e8384ebaa8b08996cd1f64737210">https://sourceforge.net/p/zsh/code/ci/3e06aeabd8a9e8384ebaa8b08996cd1f64737210</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/zsh | <5.0.6 | 5.0.6 |
debian/zsh | 5.8-6+deb11u1 5.9-4 5.9-8 | |
SUSE Zsh | <5.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-10072 is critical with a CVSS score of 9.8.
Versions of zsh before 5.0.6 are affected by CVE-2014-10072.
Update zsh to version 5.0.6 or later.
You can find more information about CVE-2014-10072 at the following references: [Reference 1](https://sourceforge.net/p/zsh/code/ci/3e06aeabd8a9e8384ebaa8b08996cd1f64737210), [Reference 2](https://usn.ubuntu.com/3593-1/), [Reference 3](https://access.redhat.com/errata/RHSA-2018:1932).
The Common Weakness Enumeration (CWE) number for CVE-2014-10072 is 119.