zsh-4.3.11-8.AXS4

エラータID: AXSA:2018-3183:01

Release date: 
Tuesday, June 19, 2018 - 20:39
Subject: 
zsh-4.3.11-8.AXS4
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
Moderate
Description: 

The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell (the Korn shell), but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions (with autoloading), a history mechanism, and more.

Security Fix(es):

* zsh: Stack-based buffer overflow in gen_matches_files() at compctl.c (CVE-2018-1083)

* zsh: buffer overflow when scanning very long directory paths for symbolic links (CVE-2014-10072)

* zsh: buffer overrun in symlinks (CVE-2017-18206)

* zsh: buffer overflow in utils.c:checkmailpath() can lead to local arbitrary code execution (CVE-2018-1100)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

The CVE-2018-1083 and CVE-2018-1100 issues were discovered by Richard Maciel Costa (Asianux).

Additional Changes:

For detailed information on changes in this release, see the Asianux Server 4.10 Release Notes and Asianux Server 4.10 Technical Notes linked from the References section.

CVE-2014-10072
In utils.c in zsh before 5.0.6, there is a buffer overflow when scanning very long directory paths for symbolic links.
CVE-2017-18206
In utils.c in zsh before 5.4, symlink expansion had a buffer overflow.
CVE-2018-1083
Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.
CVE-2018-1100
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. zsh-4.3.11-8.AXS4.src.rpm
    MD5: 87e51e742356a4b40b0feae3d3c24dc9
    SHA-256: 6a2aaa8d856b29e0fd6aebe4a3556020d5253cd639e3ce1e21de32728ec3e37c
    Size: 2.79 MB

Asianux Server 4 for x86
  1. zsh-4.3.11-8.AXS4.i686.rpm
    MD5: 5d7877de6a2a56f256afd02a47828493
    SHA-256: c242571f617ba4825c2cd078defe69eb37f41b325f8bf3a517b980f76d10f6d2
    Size: 2.21 MB

Asianux Server 4 for x86_64
  1. zsh-4.3.11-8.AXS4.x86_64.rpm
    MD5: fe5e981d2e104d2b9b15223597809c1c
    SHA-256: 19a5e2292c993c40173dc4fad7f89cd36132aedd2868ff67c984e12f4c41aac9
    Size: 2.24 MB