Release date:
2022-03-24 16:06:43 UTC
Description:
* SECURITY UPDATE: Regain dropped privileges
- debian/patches/CVE-2019-20044-pre.patch: change the order of the calls to
setgid (this should go first) and setuid in Src/options.c.
- debian/patches/CVE-2019-20044-1.patch: add extra checks to drop privileges
securely in Src/options.c.
- debian/patches/CVE-2019-20044-2.patch: add Src/openssh_bsd_setres_id.c
and its object file to Src/zsh.mdd, fix some of the checks from the
previous patch in Src/options.c, update compatibility wrappers in
Src/zsh_system.h, update the uid/gid methods in AC_CHECK_FUNCS in
configure.ac and add a test in Test/E01options.ztst.
- debian/patches/CVE-2019-20044-3.patch: improve Src/options.c changes from
above two patches.
- debian/patches/CVE-2019-20044-4.patch: clean up white spaces in
Src/options.c.
- debian/patches/CVE-2019-20044-5.patch: add privileged tests to
Test/P01privileged.ztst, remove the notes on privileged test in
Test/E01options.ztst and add the prilived tests to the Test/README.
- CVE-2019-20044
* SECURITY UPDATE: Arbitrary code execution
- debian/patches/CVE-2021-45444.patch: save PROMPTSUBST option before
the call to promptexpand() in b/Src/prompt.c and restore after it is
executed.
- CVE-2021-45444
Updated packages:
-
zsh_5.1.1-1ubuntu2.3+tuxcare.els1_amd64.deb
sha:1a1dbfce0b9aabc00d99391e107756c343c5c59c
-
zsh-common_5.1.1-1ubuntu2.3+tuxcare.els1_all.deb
sha:f1311a634160d632fbe1473228cc64a9c4db85ba
-
zsh-dev_5.1.1-1ubuntu2.3+tuxcare.els1_amd64.deb
sha:b4d92a90220a6ae65cbd8fb8c67ec380acc5dd0b
-
zsh-doc_5.1.1-1ubuntu2.3+tuxcare.els1_all.deb
sha:6528cbc2a45a4b794071ddc45d51b5b2ecb3bd07
-
zsh-static_5.1.1-1ubuntu2.3+tuxcare.els1_amd64.deb
sha:e94557d17657c0894d3f5489936683a9bda06280
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.