UbuntuUpdates.org

Package "zsh-common"

Name: zsh-common

Description:

architecture independent files for Zsh

Latest version: 5.1.1-1ubuntu2.3
Release: xenial (16.04)
Level: updates
Repository: main
Head package: zsh
Homepage: http://www.zsh.org/

Links


Download "zsh-common"


Other versions of "zsh-common" in Xenial

Repository Area Version
base main 5.1.1-1ubuntu2
security main 5.1.1-1ubuntu2.3

Changelog

Version: 5.1.1-1ubuntu2.3 2018-09-11 22:06:31 UTC

  zsh (5.1.1-1ubuntu2.3) xenial-security; urgency=medium

  * SECURITY UPDATE: Arbitrary code execution
    - debian/patches/CVE-2018-0502-and-CVE-2018-13259.patch:
      fix in Src/exec.c and add test Test/A05execution.ztst.
    - CVE-2018-0502
    - CVE-2018-13259
  * SECURITY UPDATE: Stack-based buffer overflow
    - debian/patches/CVE-2018-1100.patch: fix int Src/utils.c.
    - CVE-2018-1100

 -- <email address hidden> (Leonidas S. Barbosa) Mon, 10 Sep 2018 16:06:42 -0300

Source diff to previous version
CVE-2018-0502 An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named
CVE-2018-13259 An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program n
CVE-2018-1100 zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this t

Version: 5.1.1-1ubuntu2.2 2018-03-28 00:07:14 UTC

  zsh (5.1.1-1ubuntu2.2) xenial-security; urgency=medium

  * SECURITY UPDATE: stack-based buffer overflow
    - debian/patches/CVE-2018-1071.patch: check bounds when
      copying patch in hashcmd() in Src/exec.c, Src/utils.c.
    - CVE-2018-1071
  * SECURITY UPDATE: buffer-overflow
    - debian/patches/CVE-2018-1083.patch: check bounds on PATH_MAX
      buffer in Src/Zle/compctl.c.
    - CVE-2018-1083

 -- <email address hidden> (Leonidas S. Barbosa) Mon, 26 Mar 2018 14:16:59 -0300

Source diff to previous version
CVE-2018-1071 zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cau
CVE-2018-1083 check bounds on PATH_MAX-sized buffer used for file completion candidates

Version: 5.1.1-1ubuntu2.1 2018-03-08 18:07:31 UTC

  zsh (5.1.1-1ubuntu2.1) xenial-security; urgency=medium

  * SECURITY UPDATE: undersized buffer
    - debian/patches/CVE-2016-10714.patch: Add extra byte to PATH_MAX
      in Src/Zle/compctl.c, Src/builtin.c, Src/compat.c, Src/exec.c,
      Src/glob.c, Src/hist.c, Src/utils.c.
    - CVE-2016-10714
  * SECURITY UPDATE: NULL dereference
    - debian/patches/CVE-2017-18205.patch: fix in Src/builtin.c,
      Test/B01cd.ztst.
    - CVE-2017-18205
  * SECURITY UPATE: buffer overflow
    - debian/patches/CVE-2017-18206.patch: fix buffer overrun in xsymlinks
      in Src/utils.c.
    - CVE-2017-18206
  * SECURITY UPDATE: Crash while copy an empty hash table
    - debian/patches/CVE-2018-7549.patch: avoid crash empty
      hash table in Src/params.c.
    - CVE-2018-7549

 -- <email address hidden> (Leonidas S. Barbosa) Wed, 07 Mar 2018 10:24:39 -0300

CVE-2016-10714 In zsh before 5.3, an off-by-one error resulted in undersized buffers that were intended to support PATH_MAX characters.
CVE-2017-18205 In builtin.c in zsh before 5.4, when sh compatibility mode is used, there is a NULL pointer dereference during processing of the cd command with no a
CVE-2017-18206 In utils.c in zsh before 5.4, symlink expansion had a buffer overflow.
CVE-2018-7549 In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p.



About   -   Send Feedback to @ubuntu_updates