Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2018:1893-1

Опубликовано: 05 июл. 2018
Источник: suse-cvrf

Описание

Security update for zsh

This update for zsh to version 5.5 fixes the following issues:

Security issues fixed:

  • CVE-2018-1100: Fixes a buffer overflow in utils.c:checkmailpath() that can lead to local arbitrary code execution (bsc#1089030)
  • CVE-2018-1071: Fixed a stack-based buffer overflow in exec.c:hashcmd() (bsc#1084656)
  • CVE-2018-1083: Fixed a stack-based buffer overflow in gen_matches_files() at compctl.c (bsc#1087026)

Non-security issues fixed:

  • The effect of the NO_INTERACTIVE_COMMENTS option extends into $(...) and ... command substitutions when used on the command line.
  • The 'exec' and 'command' precommand modifiers, and options to them, are now parsed after parameter expansion.
  • Functions executed by ZLE widgets no longer have their standard input closed, but redirected from /dev/null instead.
  • There is an option WARN_NESTED_VAR, a companion to the existing WARN_CREATE_GLOBAL that causes a warning if a function updates a variable from an enclosing scope without using typeset -g.
  • zmodload now has an option -s to be silent on a failure to find a module but still print other errors.

This update was imported from the SUSE:SLE-15:Update update project.

Список пакетов

openSUSE Leap 15.0
zsh-5.5-lp150.2.3.1
zsh-htmldoc-5.5-lp150.2.3.1

Описание

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.


Затронутые продукты
openSUSE Leap 15.0:zsh-5.5-lp150.2.3.1
openSUSE Leap 15.0:zsh-htmldoc-5.5-lp150.2.3.1

Ссылки

Описание

Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.


Затронутые продукты
openSUSE Leap 15.0:zsh-5.5-lp150.2.3.1
openSUSE Leap 15.0:zsh-htmldoc-5.5-lp150.2.3.1

Ссылки

Описание

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.


Затронутые продукты
openSUSE Leap 15.0:zsh-5.5-lp150.2.3.1
openSUSE Leap 15.0:zsh-htmldoc-5.5-lp150.2.3.1

Ссылки