Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2018:1874-1

Опубликовано: 03 июл. 2018
Источник: suse-cvrf

Описание

Security update for zsh

This update for zsh to version 5.5 fixes the following issues:

Security issues fixed:

  • CVE-2018-1100: Fixes a buffer overflow in utils.c:checkmailpath() that can lead to local arbitrary code execution (bsc#1089030)
  • CVE-2018-1071: Fixed a stack-based buffer overflow in exec.c:hashcmd() (bsc#1084656)
  • CVE-2018-1083: Fixed a stack-based buffer overflow in gen_matches_files() at compctl.c (bsc#1087026)

Non-security issues fixed:

  • The effect of the NO_INTERACTIVE_COMMENTS option extends into $(...) and ... command substitutions when used on the command line.
  • The 'exec' and 'command' precommand modifiers, and options to them, are now parsed after parameter expansion.
  • Functions executed by ZLE widgets no longer have their standard input closed, but redirected from /dev/null instead.
  • There is an option WARN_NESTED_VAR, a companion to the existing WARN_CREATE_GLOBAL that causes a warning if a function updates a variable from an enclosing scope without using typeset -g.
  • zmodload now has an option -s to be silent on a failure to find a module but still print other errors.

Список пакетов

SUSE Linux Enterprise Module for Basesystem 15
zsh-5.5-3.3.15

Описание

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15:zsh-5.5-3.3.15

Ссылки

Описание

Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15:zsh-5.5-3.3.15

Ссылки

Описание

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15:zsh-5.5-3.3.15

Ссылки