It was discovered that zsh, a powerful shell and scripting language,
did not prevent recursive prompt expansion. This would allow an
attacker to execute arbitrary commands into a user’s shell, for
instance by tricking a vcs_info user into checking out a git branch
with a specially crafted name.
More Stories
chromium-124.0.6367.60-1.fc38
FEDORA-2024-5d8f4f86b0 Packages in this update: chromium-124.0.6367.60-1.fc38 Update description: update to 124.0.6367.60 High CVE-2024-3832: Object corruption in V8 High CVE-2024-3833: Object...
chromium-124.0.6367.60-1.fc39
FEDORA-2024-12edb9dec8 Packages in this update: chromium-124.0.6367.60-1.fc39 Update description: update to 124.0.6367.60 High CVE-2024-3832: Object corruption in V8 High CVE-2024-3833: Object...
python-idna-3.7-1.fc38
FEDORA-2024-73644489ec Packages in this update: python-idna-3.7-1.fc38 Update description: Update to 3.7 (rhbz#2274439), security fix for CVE-2024-3651 Read More
python-idna-3.7-1.fc39
FEDORA-2024-9176fdb518 Packages in this update: python-idna-3.7-1.fc39 Update description: Update to 3.7 (rhbz#2274439), security fix for CVE-2024-3651 Read More
USN-6737-1: GNU C Library vulnerability
Charles Fol discovered that the GNU C Library iconv feature incorrectly handled certain input sequences. An attacker could use this...
glibc-2.37-19.fc38
FEDORA-2024-f7ae5df88d Packages in this update: glibc-2.37-19.fc38 Update description: This update includes several bug fixes from the upstream glibc release branch,...