Описание
Security update for zsh
This update for zsh to version 5.5 fixes the following issues:
Security issues fixed:
- CVE-2018-1100: Fixes a buffer overflow in utils.c:checkmailpath() that can lead to local arbitrary code execution (bsc#1089030)
- CVE-2018-1071: Fixed a stack-based buffer overflow in exec.c:hashcmd() (bsc#1084656)
- CVE-2018-1083: Fixed a stack-based buffer overflow in gen_matches_files() at compctl.c (bsc#1087026)
Non-security issues fixed:
- The effect of the NO_INTERACTIVE_COMMENTS option extends into $(...)
and
...command substitutions when used on the command line. - The 'exec' and 'command' precommand modifiers, and options to them, are now parsed after parameter expansion.
- Functions executed by ZLE widgets no longer have their standard input closed, but redirected from /dev/null instead.
- There is an option WARN_NESTED_VAR, a companion to the existing WARN_CREATE_GLOBAL that causes a warning if a function updates a variable from an enclosing scope without using typeset -g.
- zmodload now has an option -s to be silent on a failure to find a module but still print other errors.
Список пакетов
SUSE Linux Enterprise Module for Basesystem 15
Ссылки
- Link for SUSE-SU-2018:1874-1
- E-Mail link for SUSE-SU-2018:1874-1
- SUSE Security Ratings
- SUSE Bug 1084656
- SUSE Bug 1087026
- SUSE Bug 1089030
- SUSE CVE CVE-2018-1071 page
- SUSE CVE CVE-2018-1083 page
- SUSE CVE CVE-2018-1100 page
Описание
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.
Затронутые продукты
Ссылки
- CVE-2018-1071
- SUSE Bug 1084656
- SUSE Bug 1200039
Описание
Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.
Затронутые продукты
Ссылки
- CVE-2018-1083
- SUSE Bug 1087026
- SUSE Bug 1189668
- SUSE Bug 1200209
Описание
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.
Затронутые продукты
Ссылки
- CVE-2018-1100
- SUSE Bug 1089030
- SUSE Bug 1189668