First published: Wed Sep 05 2018(Updated: )
An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program name that is a substring of the intended one.
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Zsh Zsh | <5.6 | |
redhat/zsh | <5.6 | 5.6 |
debian/zsh | 5.8-6+deb11u1 5.9-4 5.9-8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-13259 is a vulnerability in zsh before version 5.6 that allows shebang lines exceeding 64 characters to be truncated, potentially leading to an execve call to a program name that is a substring of the intended one.
CVE-2018-13259 has a severity rating of 9.8 (critical).
The affected software versions include zsh 5.6-1 on Ubuntu, zsh 5.1.1-1ubuntu2.3 on Xenial, zsh 5.4.2-3ubuntu3.1 on Bionic, zsh 5.0.2-3ubuntu6.3 on Trusty, and zsh 5.6 on Red Hat.
To fix CVE-2018-13259, update zsh to version 5.6-1 on Ubuntu, version 5.1.1-1ubuntu2.3 on Xenial, version 5.4.2-3ubuntu3.1 on Bionic, version 5.0.2-3ubuntu6.3 on Trusty, or version 5.6 on Red Hat.
You can find more information about CVE-2018-13259 on the MITRE CVE website, Ubuntu Security Notices, and the NIST National Vulnerability Database.