Package "zsh-beta-doc"
Name: |
zsh-beta-doc
|
Description: |
transitional package to zsh-doc
|
Latest version: |
5.0.2-3ubuntu6.3 |
Release: |
trusty (14.04) |
Level: |
security |
Repository: |
main |
Head package: |
zsh |
Homepage: |
http://www.zsh.org/ |
Links
Download "zsh-beta-doc"
Other versions of "zsh-beta-doc" in Trusty
Changelog
zsh (5.0.2-3ubuntu6.3) trusty-security; urgency=medium
* SECURITY UPDATE: Arbitrary code execution
- debian/patches/CVE-2018-0502-and-CVE-2018-13259-pre.patch:
Src/signals.h.
- debian/patches/CVE-2018-0502-and-CVE-2018-13259.patch:
fix in Src/exec.c and add test Test/A05execution.ztst.
- CVE-2018-0502
- CVE-2018-13259
* SECURITY UPDATE: Stack-based buffer overflow
- debian/patches/CVE-2018-1100.patch: fix int Src/utils.c.
- CVE-2018-1100
-- <email address hidden> (Leonidas S. Barbosa) Mon, 10 Sep 2018 09:30:36 -0300
|
Source diff to previous version |
CVE-2018-0502 |
An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named |
CVE-2018-13259 |
An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program n |
CVE-2018-1100 |
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this t |
|
zsh (5.0.2-3ubuntu6.2) trusty-security; urgency=medium
* SECURITY UPDATE: stack-based buffer overflow
- debian/patches/CVE-2018-1071.patch: check bounds when
copying patch in hashcmd() in Src/exec.c, Src/utils.c.
- CVE-2018-1071
* SECURITY UPDATE: buffer-overflow
- debian/patches/CVE-2018-1083.patch: check bounds on PATH_MAX
buffer in Src/Zle/compctl.c.
- CVE-2018-1083
-- <email address hidden> (Leonidas S. Barbosa) Mon, 26 Mar 2018 14:07:05 -0300
|
Source diff to previous version |
CVE-2018-1071 |
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cau |
CVE-2018-1083 |
check bounds on PATH_MAX-sized buffer used for file completion candidates |
|
zsh (5.0.2-3ubuntu6.1) trusty-security; urgency=medium
* SECURITY UPDATE: possibly privilege escalation
- debian/patches/CVE-2014-10070.patch: safer import of
numerical variables from environment in Src/params.c,
Src/zsh.h.
- CVE-2014-10070
* SECURITY UPDATE: buffer overflow
- debian/patches/CVE-2014-10071.patch: avoid buffer overflow
for very long fds in Src/exec.c.
- CVE-2014-10071
* SECURITY UPDATE: buffer overflow
- debian/patches/CVE-2014-10072.patch: fix buffer overflow in
Src/utils.c.
- CVE-2014-10072
* SECURITY UPDATE: undersized buffer
- debian/patches/CVE-2016-10714.patch: Add extra byte to PATH_MAX
in Src/Zle/compctl.c, Src/builtin.c, Src/compat.c, Src/exec.c,
Src/glob.c, Src/hist.c, Src/utils.c.
- CVE-2016-10714
* SECURITY UPDATE: NULL dereference
- debian/patches/CVE-2017-18205.patch: fix in Src/builtin.c,
Test/B01cd.ztst.
- CVE-2017-18205
* SECURITY UPDATE: Crash while copy an empty hash table
- debian/patches/CVE-2018-7549.patch: avoid crash empty
hash table in Src/params.c.
- CVE-2018-7549
-- <email address hidden> (Leonidas S. Barbosa) Wed, 07 Mar 2018 08:03:11 -0300
|
CVE-2014-10070 |
zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numb |
CVE-2014-10071 |
In exec.c in zsh before 5.0.7, there is a buffer overflow for very long fds in the ">& fd" syntax. |
CVE-2014-10072 |
In utils.c in zsh before 5.0.6, there is a buffer overflow when scanning very long directory paths for symbolic links. |
CVE-2016-10714 |
In zsh before 5.3, an off-by-one error resulted in undersized buffers that were intended to support PATH_MAX characters. |
CVE-2017-18205 |
In builtin.c in zsh before 5.4, when sh compatibility mode is used, there is a NULL pointer dereference during processing of the cd command with no a |
CVE-2018-7549 |
In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p. |
|
About
-
Send Feedback to @ubuntu_updates