Date: Sat, 12 Feb 2022 18:35:26 GMT From: Yasuhiro Kimura <yasu@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 758ec3732039 - main - security/vuxml: Document arbitrary command execution vulnerability in Zsh Message-ID: <202202121835.21CIZQvd089615@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by yasu: URL: https://cgit.FreeBSD.org/ports/commit/?id=758ec373203963131ed2112cc433d23f541e2b37 commit 758ec373203963131ed2112cc433d23f541e2b37 Author: Yasuhiro Kimura <yasu@FreeBSD.org> AuthorDate: 2022-02-12 18:31:01 +0000 Commit: Yasuhiro Kimura <yasu@FreeBSD.org> CommitDate: 2022-02-12 18:34:20 +0000 security/vuxml: Document arbitrary command execution vulnerability in Zsh --- security/vuxml/vuln-2022.xml | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml index 279497a8eafc..5e3a5b38499a 100644 --- a/security/vuxml/vuln-2022.xml +++ b/security/vuxml/vuln-2022.xml @@ -1,3 +1,37 @@ + <vuln vid="d923fb0c-8c2f-11ec-aa85-0800270512f4"> + <topic>zsh -- Arbitrary command execution vulnerability</topic> + <affects> + <package> + <name>zsh</name> + <range><lt>5.8.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p> Marc Cornellà reports:</p> + <blockquote cite="https://zsh.sourceforge.io/releases.html"> + <p> + Some prompt expansion sequences, such as %F, support 'arguments' + which are themselves expanded in case they contain colour values, + etc. This additional expansion would trigger PROMPT_SUBST evaluation, + if enabled. This could be abused to execute code the user didn't + expect. e.g., given a certain prompt configuration, an attacker + could trick a user into executing arbitrary code by having them + check out a Git branch with a specially crafted name. + </p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2021-45444</cvename> + <url>https://zsh.sourceforge.io/releases.html</url> + </references> + <dates> + <discovery>2022-02-12</discovery> + <entry>2022-02-12</entry> + </dates> + </vuln> + <vuln vid="0b0ad196-1ee8-4a98-89b1-4d5d82af49a9"> <topic>jenkins -- DoS vulnerability in bundled XStream library</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202202121835.21CIZQvd089615>