Package "zsh"
Name: |
zsh
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- shell with lots of features (static link)
|
Latest version: |
5.1.1-1ubuntu2.3 |
Release: |
xenial (16.04) |
Level: |
security |
Repository: |
universe |
Links
Other versions of "zsh" in Xenial
Packages in group
Deleted packages are displayed in grey.
Changelog
zsh (5.1.1-1ubuntu2.3) xenial-security; urgency=medium
* SECURITY UPDATE: Arbitrary code execution
- debian/patches/CVE-2018-0502-and-CVE-2018-13259.patch:
fix in Src/exec.c and add test Test/A05execution.ztst.
- CVE-2018-0502
- CVE-2018-13259
* SECURITY UPDATE: Stack-based buffer overflow
- debian/patches/CVE-2018-1100.patch: fix int Src/utils.c.
- CVE-2018-1100
-- <email address hidden> (Leonidas S. Barbosa) Mon, 10 Sep 2018 16:06:42 -0300
|
Source diff to previous version |
CVE-2018-0502 |
An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named |
CVE-2018-13259 |
An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program n |
CVE-2018-1100 |
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this t |
|
zsh (5.1.1-1ubuntu2.2) xenial-security; urgency=medium
* SECURITY UPDATE: stack-based buffer overflow
- debian/patches/CVE-2018-1071.patch: check bounds when
copying patch in hashcmd() in Src/exec.c, Src/utils.c.
- CVE-2018-1071
* SECURITY UPDATE: buffer-overflow
- debian/patches/CVE-2018-1083.patch: check bounds on PATH_MAX
buffer in Src/Zle/compctl.c.
- CVE-2018-1083
-- <email address hidden> (Leonidas S. Barbosa) Mon, 26 Mar 2018 14:16:59 -0300
|
Source diff to previous version |
CVE-2018-1071 |
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cau |
CVE-2018-1083 |
check bounds on PATH_MAX-sized buffer used for file completion candidates |
|
zsh (5.1.1-1ubuntu2.1) xenial-security; urgency=medium
* SECURITY UPDATE: undersized buffer
- debian/patches/CVE-2016-10714.patch: Add extra byte to PATH_MAX
in Src/Zle/compctl.c, Src/builtin.c, Src/compat.c, Src/exec.c,
Src/glob.c, Src/hist.c, Src/utils.c.
- CVE-2016-10714
* SECURITY UPDATE: NULL dereference
- debian/patches/CVE-2017-18205.patch: fix in Src/builtin.c,
Test/B01cd.ztst.
- CVE-2017-18205
* SECURITY UPATE: buffer overflow
- debian/patches/CVE-2017-18206.patch: fix buffer overrun in xsymlinks
in Src/utils.c.
- CVE-2017-18206
* SECURITY UPDATE: Crash while copy an empty hash table
- debian/patches/CVE-2018-7549.patch: avoid crash empty
hash table in Src/params.c.
- CVE-2018-7549
-- <email address hidden> (Leonidas S. Barbosa) Wed, 07 Mar 2018 10:24:39 -0300
|
CVE-2016-10714 |
In zsh before 5.3, an off-by-one error resulted in undersized buffers that were intended to support PATH_MAX characters. |
CVE-2017-18205 |
In builtin.c in zsh before 5.4, when sh compatibility mode is used, there is a NULL pointer dereference during processing of the cd command with no a |
CVE-2017-18206 |
In utils.c in zsh before 5.4, symlink expansion had a buffer overflow. |
CVE-2018-7549 |
In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p. |
|
About
-
Send Feedback to @ubuntu_updates