Search CVE reports
1 – 10 of 16 results
CVE-2021-45444
Low prioritySome fixes available 4 of 5
In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
1 affected packages
zsh
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zsh | Not affected | Needs evaluation | Fixed | Fixed | Fixed |
CVE-2019-20044
Low prioritySome fixes available 2 of 4
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by...
1 affected packages
zsh
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zsh | Not affected | Needs evaluation | Not affected | Fixed | Fixed |
CVE-2018-13259
Medium priorityAn issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program name that is a substring of the intended one.
1 affected packages
zsh
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zsh | — | — | — | Fixed | Fixed |
CVE-2018-0502
Medium priorityAn issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line.
1 affected packages
zsh
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zsh | — | — | — | Fixed | Fixed |
CVE-2018-1100
Low prioritySome fixes available 3 of 4
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.
1 affected packages
zsh
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zsh | — | — | — | Fixed | Fixed |
CVE-2018-1083
Medium priorityZsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of...
1 affected packages
zsh
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zsh | — | — | — | — | Fixed |
CVE-2018-1071
Medium priorityzsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.
1 affected packages
zsh
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zsh | — | — | — | — | Fixed |
CVE-2018-7549
Medium priorityIn params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p.
1 affected packages
zsh
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zsh | — | — | — | — | Fixed |
CVE-2018-7548
Medium priorityIn subst.c in zsh through 5.4.2, there is a NULL pointer dereference when using ${(PA)...} on an empty array result.
1 affected packages
zsh
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zsh | — | — | — | — | Not affected |
CVE-2017-18206
Medium priorityIn utils.c in zsh before 5.4, symlink expansion had a buffer overflow.
1 affected packages
zsh
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zsh | — | — | — | — | Fixed |