drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in zsh
| Name: |
Ausführen beliebiger Kommandos in zsh |
|
| ID: |
SSA:2025-109-01 |
|
| Distribution: |
Slackware |
|
| Plattformen: |
Slackware 15.0, Slackware x86_64 15.0 |
|
| Datum: |
Sa, 19. April 2025, 23:12 |
|
| Referenzen: |
https://www.cve.org/CVERecord?id=CVE-2021-45444 |
|
| Applikationen: |
Zsh |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
[slackware-security] zsh (SSA:2025-109-01)
New zsh packages are available for Slackware 15.0 to fix a security issue.
Here are the details from the Slackware 15.0 ChangeLog: +--------------------------+ patches/packages/zsh-5.9-i586-1_slack15.0.txz: Upgraded. This release fixes a security issue in zsh-5.8: Some prompt expansion sequences, such as %F, support 'arguments' which are themselves expanded in case they contain colour values, etc. This additional expansion would trigger PROMPT_SUBST evaluation, if enabled. This could be abused to execute code the user didn't expect. e.g., given a certain prompt configuration, an attacker could trick a user into executing arbitrary code by having them check out a Git branch with a specially crafted name. This is fixed in the shell itself by no longer performing PROMPT_SUBST evaluation on these prompt-expansion arguments. Note that this is a potential incompatibilty if you are relying on the previous behavior of PROMPT_SUBST. Thanks to pblsxw for the heads-up on this. For more information, see: https://www.cve.org/CVERecord?id=CVE-2021-45444 (* Security fix *) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated package for Slackware 15.0: zsh-5.9-i586-1_slack15.0.txz
Updated package for Slackware x86_64 15.0: zsh-5.9-x86_64-1_slack15.0.txz
MD5 signatures: +-------------+
Slackware 15.0 package: 061804a8d52ec3c1492bda4f05748fea zsh-5.9-i586-1_slack15.0.txz
Slackware x86_64 15.0 package: 3d0b84ddbbeedf0d346ef1819bb29e32 zsh-5.9-x86_64-1_slack15.0.txz
Installation instructions: +------------------------+
Upgrade the package as root: # upgradepkg zsh-5.9-i586-1_slack15.0.txz
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE-----
iF0EARECAB0WIQTsVknaQB4iq/pnNu9qRGPAQBAiMwUCaAP5TAAKCRBqRGPAQBAi M1OjAJ40OPFLR2YdsSB8d3vkiNtrsCpBtQCdFvGP75tpRvMVhtTtKGJ2lK5C1r4= =iNDM -----END PGP SIGNATURE-----
|
|
|
|