First published: Tue Feb 27 2018(Updated: )
A flaw was found in zsh prior 5.3.1. There was no check when copying to the internal xbuf2 for a preliminary test. References: <a href="https://sourceforge.net/p/zsh/code/ci/c7a9cf465dd620ef48d586026944d9bd7a0d5d6d">https://sourceforge.net/p/zsh/code/ci/c7a9cf465dd620ef48d586026944d9bd7a0d5d6d</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zsh Zsh | <5.4 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
redhat/zsh | <5.4 | 5.4 |
debian/zsh | 5.8-6+deb11u1 5.9-4 5.9-8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2017-18206.
The severity of CVE-2017-18206 is critical (9.8).
The affected software versions include zsh before 5.4.
To fix CVE-2017-18206, update zsh to version 5.4 or higher.
You can find more information about CVE-2017-18206 in the references provided: [Reference 1](https://access.redhat.com/errata/RHSA-2018:1932), [Reference 2](https://access.redhat.com/errata/RHSA-2018:3073), [Reference 3](https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html).