csaf2cusa/cusas/z/zsh/zsh-5.8-3_openEuler-SA-2022-2094.json
Jia Chao 0b84f3c661 增加测试用的配置和目录
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-02 15:51:55 +08:00

14 lines
959 B
JSON

{
"id": "openEuler-SA-2022-2094",
"url": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2022-2094",
"title": "An update for zsh is now available for openEuler-22.03-LTS",
"severity": "Important",
"description": "The zsh is a shell designed for interactive use, and it is also a powerful scripting language. Many of the useful features of bash, ksh, and tcsh were incorporated into zsh. It can match files by file extension without running an external program, share command history with any shell, and more.\r\n\r\nSecurity Fix(es):\r\n\r\nIn zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.(CVE-2021-45444)",
"cves": [
{
"id": "CVE-2021-45444",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45444",
"severity": "Important"
}
]
}