zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers). That could allow local privilege escalation, under some specific and atypical conditions where zsh is being invoked in privilege-elevation contexts when the environment has not been properly sanitized, such as when zsh is invoked by sudo on systems where "env_reset" has been disabled.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1304-1 | zsh security update |
EUVD |
EUVD-2014-1137 | zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers). That could allow local privilege escalation, under some specific and atypical conditions where zsh is being invoked in privilege-elevation contexts when the environment has not been properly sanitized, such as when zsh is invoked by sudo on systems where "env_reset" has been disabled. |
Ubuntu USN |
USN-3593-1 | Zsh vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T14:02:38.191Z
Reserved: 2018-02-27T00:00:00
Link: CVE-2014-10070
No data.
Status : Modified
Published: 2018-02-27T22:29:00.247
Modified: 2024-11-21T02:03:27.213
Link: CVE-2014-10070
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN