Zsh Mailing List Archive
Messages sorted by: Reverse Date, Date, Thread, Author

Re: Zsh - Multiple DoS Vulnerabilities



Bart Schaefer wrote on Tue, 14 May 2019 22:26 +00:00:
> On Tue, May 14, 2019 at 2:39 PM Daniel Shahaf <d.s@xxxxxxxxxxxxxxxxxx> wrote:
> >
> > I've been trying to come up with counterexamples.  What if somebody
> > installed a /etc/zshenv that does, say, 'disable zmodload enable'?
> 
> You can bypass /etc/zshenv by, for example, invoking zsh as "sh" and
> then running "emulate -R" and/or otherwise futzing with setopts.

I don't think there's an easy solution here, since sourcing /etc/zshenv
in mid-session could be a can of worms, too.

> So either THAT is a security flaw, or your example isn't one either.

I suppose my example was a security flaw _in the sysadmin's setup_.  If someone
wants to make the case that it's a bug in zsh, I'm all ears.

Cheers,

Daniel



Messages sorted by: Reverse Date, Date, Thread, Author