SUSE-SU-2018:1874-1

Source
https://www.suse.com/support/update/announcement/2018/suse-su-20181874-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2018:1874-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2018:1874-1
Related
Published
2018-07-03T16:09:43Z
Modified
2018-07-03T16:09:43Z
Summary
Security update for zsh
Details

This update for zsh to version 5.5 fixes the following issues:

Security issues fixed:

  • CVE-2018-1100: Fixes a buffer overflow in utils.c:checkmailpath() that can lead to local arbitrary code execution (bsc#1089030)
  • CVE-2018-1071: Fixed a stack-based buffer overflow in exec.c:hashcmd() (bsc#1084656)
  • CVE-2018-1083: Fixed a stack-based buffer overflow in genmatchesfiles() at compctl.c (bsc#1087026)

Non-security issues fixed:

  • The effect of the NOINTERACTIVECOMMENTS option extends into $(...) and ... command substitutions when used on the command line.
  • The 'exec' and 'command' precommand modifiers, and options to them, are now parsed after parameter expansion.
  • Functions executed by ZLE widgets no longer have their standard input closed, but redirected from /dev/null instead.
  • There is an option WARNNESTEDVAR, a companion to the existing WARNCREATEGLOBAL that causes a warning if a function updates a variable from an enclosing scope without using typeset -g.
  • zmodload now has an option -s to be silent on a failure to find a module but still print other errors.
References

Affected packages

SUSE:Linux Enterprise Module for Basesystem 15 / zsh

Package

Name
zsh
Purl
pkg:rpm/suse/zsh&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.5-3.3.15

Ecosystem specific

{
    "binaries": [
        {
            "zsh": "5.5-3.3.15"
        }
    ]
}