Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1557382 - (CVE-2018-1083) CVE-2018-1083 zsh: Stack-based buffer overflow in gen_matches_files() at compctl.c
CVE-2018-1083 zsh: Stack-based buffer overflow in gen_matches_files() at comp...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20180326,repor...
: Security
Depends On: 1560702 1560696 1560697 1560700 1560701
Blocks: 1557385
  Show dependency treegraph
 
Reported: 2018-03-16 10:01 EDT by Pedro Sampaio
Modified: 2018-10-30 03:30 EDT (History)
7 users (show)

See Also:
Fixed In Version: zsh 5.5
Doc Type: If docs needed, set a value
Doc Text:
A buffer overflow flaw was found in the zsh shell auto-complete functionality. A local, unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use auto-complete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:1932 None None None 2018-06-19 00:56 EDT
Red Hat Product Errata RHSA-2018:3073 None None None 2018-10-30 03:30 EDT

  None (edit)
Description Pedro Sampaio 2018-03-16 10:01:25 EDT
zsh is vulnerable to a stack-based buffer overflow in the gen_matches_files() function. A local attacker could exploit this through tab completion of directories with long names leading to arbitrary code execution.
Comment 9 Richard Maciel Costa 2018-03-26 15:10:55 EDT
Created zsh tracking bugs for this issue:

Affects: fedora-all [bug 1560696]
Comment 12 Richard Maciel Costa 2018-05-25 09:13:45 EDT
Acknowledgments:

Name: Richard Maciel Costa (Red Hat)
Comment 13 errata-xmlrpc 2018-06-19 00:56:26 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2018:1932 https://access.redhat.com/errata/RHSA-2018:1932
Comment 14 errata-xmlrpc 2018-10-30 03:30:20 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:3073 https://access.redhat.com/errata/RHSA-2018:3073

Note You need to log in before you can comment on or make changes to this bug.