[CLSA-2022:1648138003] Fix CVE(s): CVE-2019-20044, CVE-2021-45444
Type:
security
Severity:
moderate
Release date:
2022-03-24 16:06:43 UTC
Description:
* SECURITY UPDATE: Regain dropped privileges - debian/patches/CVE-2019-20044-pre.patch: change the order of the calls to setgid (this should go first) and setuid in Src/options.c. - debian/patches/CVE-2019-20044-1.patch: add extra checks to drop privileges securely in Src/options.c. - debian/patches/CVE-2019-20044-2.patch: add Src/openssh_bsd_setres_id.c and its object file to Src/zsh.mdd, fix some of the checks from the previous patch in Src/options.c, update compatibility wrappers in Src/zsh_system.h, update the uid/gid methods in AC_CHECK_FUNCS in configure.ac and add a test in Test/E01options.ztst. - debian/patches/CVE-2019-20044-3.patch: improve Src/options.c changes from above two patches. - debian/patches/CVE-2019-20044-4.patch: clean up white spaces in Src/options.c. - debian/patches/CVE-2019-20044-5.patch: add privileged tests to Test/P01privileged.ztst, remove the notes on privileged test in Test/E01options.ztst and add the prilived tests to the Test/README. - CVE-2019-20044 * SECURITY UPDATE: Arbitrary code execution - debian/patches/CVE-2021-45444.patch: save PROMPTSUBST option before the call to promptexpand() in b/Src/prompt.c and restore after it is executed. - CVE-2021-45444
Updated packages:
  • zsh_5.1.1-1ubuntu2.3+tuxcare.els1_amd64.deb
    sha:1a1dbfce0b9aabc00d99391e107756c343c5c59c
  • zsh-common_5.1.1-1ubuntu2.3+tuxcare.els1_all.deb
    sha:f1311a634160d632fbe1473228cc64a9c4db85ba
  • zsh-dev_5.1.1-1ubuntu2.3+tuxcare.els1_amd64.deb
    sha:b4d92a90220a6ae65cbd8fb8c67ec380acc5dd0b
  • zsh-doc_5.1.1-1ubuntu2.3+tuxcare.els1_all.deb
    sha:6528cbc2a45a4b794071ddc45d51b5b2ecb3bd07
  • zsh-static_5.1.1-1ubuntu2.3+tuxcare.els1_amd64.deb
    sha:e94557d17657c0894d3f5489936683a9bda06280
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.