Product:

Zsh

(Zsh)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 13
Date Id Summary Products Score Patch Annotated
2018-03-09 CVE-2018-1071 CVE-2018-1071 zsh: Stack-based buffer overflow in exec.c:hashcmd() Ubuntu_linux, Debian_linux, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_workstation, Zsh 5.5
2018-04-11 CVE-2018-1100 A buffer overflow flaw was found in the zsh shell check path functionality. A local, unprivileged user can create a specially crafted message file, which, if used to set a custom "you have new mail" message, leads to code execution in the context of the user who receives the message. If the user affected is privileged, this leads to privilege escalation. Ubuntu_linux, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_workstation, Zsh 7.8
2020-02-24 CVE-2019-20044 In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid(). Ipados, Iphone_os, Mac_os_x, Tvos, Watchos, Debian_linux, Fedora, Zsh 7.8
2022-02-14 CVE-2021-45444 In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion. Mac_os_x, Macos, Debian_linux, Fedora, Zsh 7.8
2018-09-05 CVE-2018-13259 An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program name that is a substring of the intended one. Ubuntu_linux, Zsh 9.8
2018-03-28 CVE-2018-1083 Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation. Ubuntu_linux, Debian_linux, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_workstation, Zsh 7.8
2018-09-05 CVE-2018-0502 An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line. Ubuntu_linux, Zsh 9.8
2018-02-27 CVE-2017-18206 In utils.c in zsh before 5.4, symlink expansion had a buffer overflow. Ubuntu_linux, Zsh 9.8
2018-02-27 CVE-2016-10714 In zsh before 5.3, an off-by-one error resulted in undersized buffers that were intended to support PATH_MAX characters. Ubuntu_linux, Zsh 9.8
2018-02-27 CVE-2014-10071 In exec.c in zsh before 5.0.7, there is a buffer overflow for very long fds in the ">& fd" syntax. Ubuntu_linux, Zsh 9.8