UbuntuUpdates.org

Package "zsh-dbg"

Name: zsh-dbg

Description:

shell with lots of features (debugging symbols)

Latest version: 5.0.2-3ubuntu6.3
Release: trusty (14.04)
Level: updates
Repository: main
Head package: zsh
Homepage: http://www.zsh.org/

Links


Download "zsh-dbg"


Other versions of "zsh-dbg" in Trusty

Repository Area Version
base main 5.0.2-3ubuntu6
security main 5.0.2-3ubuntu6.3
backports main 5.0.5-4ubuntu1~ubuntu14.04.1

Changelog

Version: 5.0.2-3ubuntu6.3 2018-09-11 22:06:27 UTC

  zsh (5.0.2-3ubuntu6.3) trusty-security; urgency=medium

  * SECURITY UPDATE: Arbitrary code execution
    - debian/patches/CVE-2018-0502-and-CVE-2018-13259-pre.patch:
      Src/signals.h.
    - debian/patches/CVE-2018-0502-and-CVE-2018-13259.patch:
      fix in Src/exec.c and add test Test/A05execution.ztst.
    - CVE-2018-0502
    - CVE-2018-13259
  * SECURITY UPDATE: Stack-based buffer overflow
    - debian/patches/CVE-2018-1100.patch: fix int Src/utils.c.
    - CVE-2018-1100

 -- <email address hidden> (Leonidas S. Barbosa) Mon, 10 Sep 2018 09:30:36 -0300

Source diff to previous version
CVE-2018-0502 An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named
CVE-2018-13259 An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program n
CVE-2018-1100 zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this t

Version: 5.0.2-3ubuntu6.2 2018-03-28 13:07:01 UTC

  zsh (5.0.2-3ubuntu6.2) trusty-security; urgency=medium

  * SECURITY UPDATE: stack-based buffer overflow
    - debian/patches/CVE-2018-1071.patch: check bounds when
      copying patch in hashcmd() in Src/exec.c, Src/utils.c.
    - CVE-2018-1071
  * SECURITY UPDATE: buffer-overflow
    - debian/patches/CVE-2018-1083.patch: check bounds on PATH_MAX
      buffer in Src/Zle/compctl.c.
    - CVE-2018-1083

 -- <email address hidden> (Leonidas S. Barbosa) Mon, 26 Mar 2018 14:07:05 -0300

Source diff to previous version
CVE-2018-1071 zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cau
CVE-2018-1083 check bounds on PATH_MAX-sized buffer used for file completion candidates

Version: 5.0.2-3ubuntu6.1 2018-03-08 18:07:28 UTC

  zsh (5.0.2-3ubuntu6.1) trusty-security; urgency=medium

  * SECURITY UPDATE: possibly privilege escalation
    - debian/patches/CVE-2014-10070.patch: safer import of
      numerical variables from environment in Src/params.c,
      Src/zsh.h.
    - CVE-2014-10070
  * SECURITY UPDATE: buffer overflow
    - debian/patches/CVE-2014-10071.patch: avoid buffer overflow
      for very long fds in Src/exec.c.
    - CVE-2014-10071
  * SECURITY UPDATE: buffer overflow
    - debian/patches/CVE-2014-10072.patch: fix buffer overflow in
      Src/utils.c.
    - CVE-2014-10072
  * SECURITY UPDATE: undersized buffer
    - debian/patches/CVE-2016-10714.patch: Add extra byte to PATH_MAX
      in Src/Zle/compctl.c, Src/builtin.c, Src/compat.c, Src/exec.c,
      Src/glob.c, Src/hist.c, Src/utils.c.
    - CVE-2016-10714
  * SECURITY UPDATE: NULL dereference
    - debian/patches/CVE-2017-18205.patch: fix in Src/builtin.c,
      Test/B01cd.ztst.
    - CVE-2017-18205
  * SECURITY UPDATE: Crash while copy an empty hash table
    - debian/patches/CVE-2018-7549.patch: avoid crash empty
      hash table in Src/params.c.
    - CVE-2018-7549

 -- <email address hidden> (Leonidas S. Barbosa) Wed, 07 Mar 2018 08:03:11 -0300

CVE-2014-10070 zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numb
CVE-2014-10071 In exec.c in zsh before 5.0.7, there is a buffer overflow for very long fds in the ">& fd" syntax.
CVE-2014-10072 In utils.c in zsh before 5.0.6, there is a buffer overflow when scanning very long directory paths for symbolic links.
CVE-2016-10714 In zsh before 5.3, an off-by-one error resulted in undersized buffers that were intended to support PATH_MAX characters.
CVE-2017-18205 In builtin.c in zsh before 5.4, when sh compatibility mode is used, there is a NULL pointer dereference during processing of the cd command with no a
CVE-2018-7549 In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p.



About   -   Send Feedback to @ubuntu_updates