Name: | zsh |
---|---|
Version: | 5.0.2 |
Release: | 34.el7_7.2 |
Architecture: | aarch64 |
Group: | System Environment/Shells |
Size: | 7366806 |
License: | MIT |
RPM: | zsh-5.0.2-34.el7_7.2.aarch64.rpm |
Source RPM: | zsh-5.0.2-34.el7_7.2.src.rpm |
Build Date: | Wed Mar 18 2020 |
Build Host: | ca-buildarm04.us.oracle.com |
Vendor: | Oracle America |
URL: | http://zsh.sourceforge.net/ |
Summary: | Powerful interactive shell |
Description: | The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell (the Korn shell), but includes many enhancements. Zsh supports command line editing, built-in spelling correction, programmable command completion, shell functions (with autoloading), a history mechanism, and more. |
- improve printing of error messages introduced by the fix of CVE-2019-20044
- drop privileges securely when unsetting PRIVILEGED option (CVE-2019-20044)
- fix regression in oh-my-zsh vcs_info hooks introduced in -30 (#1677696)
- fix improper handling of shebang line longer than 64 bytes (CVE-2018-13259)
- fix defects detected by Coverity related to CVE-2017-18206 and CVE-2018-1083
- fix stack-based buffer overflow in utils.c:checkmailpath() (CVE-2018-1100) - fix stack-based buffer overflow in gen_matches_files() (CVE-2018-1083) - fix stack-based buffer overflow in exec.c:hashcmd() (CVE-2018-1071) - avoid crash when copying empty hash table (CVE-2018-7549) - fix buffer overrun in xsymlinks (CVE-2017-18206) - fix NULL dereference in cd (CVE-2017-18205) - fix buffer overflow when scanning very long path for symlinks (CVE-2014-10072) - fix buffer overflow for very long fds in >& fd syntax (CVE-2014-10071)
- fix crash while inputting long multi-line strings (#1492595)
- zero new space allocated in prompt buffer (#1408619)
- fix parsing of parameter subscript expression with NOEXEC (#1398740)
- fix crash while parsing the here-document syntax (#1374752)