Zsh Zsh

Do you want an email whenever new security vulnerabilities are reported in Zsh?

By the Year

In 2024 there have been 0 vulnerabilities in Zsh . Zsh did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 1 7.80
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 7 8.29

It may take a day or so for new Zsh vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Zsh Security Vulnerabilities

In zsh before 5.8.1, an attacker

CVE-2021-45444 7.8 - High - February 14, 2022

In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.

An issue was discovered in zsh before 5.6

CVE-2018-0502 9.8 - Critical - September 05, 2018

An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line.

Improper Input Validation

An issue was discovered in zsh before 5.6

CVE-2018-13259 9.8 - Critical - September 05, 2018

An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program name that is a substring of the intended one.

Improper Input Validation

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function

CVE-2018-1100 7.8 - High - April 11, 2018

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

Classic Buffer Overflow

Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality

CVE-2018-1083 7.8 - High - March 28, 2018

Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.

Buffer Overflow

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function

CVE-2018-1071 5.5 - Medium - March 09, 2018

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.

Stack Overflow

In subst.c in zsh through 5.4.2, there is a NULL pointer dereference when using ${(PA)

CVE-2018-7548 9.8 - Critical - February 27, 2018

In subst.c in zsh through 5.4.2, there is a NULL pointer dereference when using ${(PA)...} on an empty array result.

NULL Pointer Dereference

In params.c in zsh through 5.4.2

CVE-2018-7549 7.5 - High - February 27, 2018

In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p.

Improper Input Validation

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Red Hat Enterprise Linux Workstation or by Zsh? Click the Watch button to subscribe.

Zsh
Vendor

Zsh
Product

subscribe