zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "zsh", "binary_version": "5.0.2-3ubuntu6.2" }, { "binary_name": "zsh-beta", "binary_version": "5.0.2-3ubuntu6.2" }, { "binary_name": "zsh-beta-doc", "binary_version": "5.0.2-3ubuntu6.2" }, { "binary_name": "zsh-common", "binary_version": "5.0.2-3ubuntu6.2" }, { "binary_name": "zsh-dbg", "binary_version": "5.0.2-3ubuntu6.2" }, { "binary_name": "zsh-dbgsym", "binary_version": "5.0.2-3ubuntu6.2" }, { "binary_name": "zsh-dev", "binary_version": "5.0.2-3ubuntu6.2" }, { "binary_name": "zsh-doc", "binary_version": "5.0.2-3ubuntu6.2" }, { "binary_name": "zsh-static", "binary_version": "5.0.2-3ubuntu6.2" }, { "binary_name": "zsh-static-dbgsym", "binary_version": "5.0.2-3ubuntu6.2" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "zsh", "binary_version": "5.1.1-1ubuntu2.2" }, { "binary_name": "zsh-common", "binary_version": "5.1.1-1ubuntu2.2" }, { "binary_name": "zsh-dbg", "binary_version": "5.1.1-1ubuntu2.2" }, { "binary_name": "zsh-dbgsym", "binary_version": "5.1.1-1ubuntu2.2" }, { "binary_name": "zsh-dev", "binary_version": "5.1.1-1ubuntu2.2" }, { "binary_name": "zsh-doc", "binary_version": "5.1.1-1ubuntu2.2" }, { "binary_name": "zsh-static", "binary_version": "5.1.1-1ubuntu2.2" }, { "binary_name": "zsh-static-dbgsym", "binary_version": "5.1.1-1ubuntu2.2" } ] }