• [gentoo-announce] [ GLSA 202407-01 ] Zsh: Prompt Expansion Vulnerabilit

    From glsamaker@gentoo.org@21:1/5 to All on Mon Jul 1 08:20:01 2024
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202407-01
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: Normal
    Title: Zsh: Prompt Expansion Vulnerability
    Date: July 01, 2024
    Bugs: #833252
    ID: 202407-01

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    A vulnerability has been discovered in Zsh, which can lead to execution
    of arbitrary code.

    Background
    ==========

    A shell designed for interactive use, although it is also a powerful
    scripting language.

    Affected packages
    =================

    Package Vulnerable Unaffected
    -------------- ------------ ------------
    app-shells/zsh < 5.8.1 >= 5.8.1

    Description
    ===========

    Multiple vulnerabilities have been discovered in Zsh. Please review the
    CVE identifiers referenced below for details.

    Impact
    ======

    A vulnerability in prompt expansion could be exploited through e.g.
    VCS_Info to execute arbitrary shell commands without a user's knowledge.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All Zsh users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-shells/zsh-5.8.1"

    References
    ==========

    [ 1 ] CVE-2021-45444
    https://nvd.nist.gov/vuln/detail/CVE-2021-45444

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202407-01

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2024 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmaCQ8gACgkQFMQkOaVy +9nOSxAAmDxJwtcpjbc4Nupjj/y9YER2l/oeowQMQlG9xBMwnfYHQH08hrZPF4rh zzY3outUkcK1TYZHOricYScsjLSILdBgONdh3wsUPusYY01Rcq59/qCfsBa9GUZX xI0ONhtNOIg0ZwZRjj9nLa4rFxmXWCln+CYYo/4033bxt/RsbOrJGA8v6L04dKUv qpcdLUzdnaf7kMKO3iW8DKZ3fwtWeE6/cXkT+BFGl/q14gy1Z712aFPLSRR5YIXm IPDnnpS6m9ILnDsAyV/VgXe+PvW4+wPkMn0BMwZWQ1OeK9WaGCs0ThoSIva160nT q5ILt9a0fLqSWRQawxxTiHXd3JeOZrVNuwYI6wT+0bp4S+equySdR96kow2+QhE2 YoUe8HHUN6IAV3uFDcfYQNGxa4pVE7p1iwVKB3iq2+uhw8nkPXtQxYZ41nbi2PDY j73lwop56SUEWbWcJKImvEh6BCLrMSzSBWG419h70y0rbizRXYYhs9Xfma9ZC/DD 4NBfvO01x3P//cp/LpVmYj3/CHS2+xr0mcCnNQxDUxbAFwoR3+h9M2xCi+epc77l s1XpOiKgZQoyWAqWlbt5fQzYkEbekqqAhFQgFZqHspnDGlXiVVB/VZ3wEz7P3l+v 7X7EpwfEitMugsKTIv3ODzqkfNA3ibfPl/gBSzwJGNpVa0Rq9Ic=
    =eIA8
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)