Richard Maciel Costa discovered that Zsh incorrectly handled certain inputs. An attacker could possibly use this to cause a denial of service. (CVE-2018-1071)
It was discovered that Zsh incorrectly handled certain files. An attacker could possibly use this to execute arbitrary code. (CVE-2018-1083)
{ "availability": "No subscription required", "binaries": [ { "binary_name": "zsh", "binary_version": "5.0.2-3ubuntu6.2" }, { "binary_name": "zsh-beta", "binary_version": "5.0.2-3ubuntu6.2" }, { "binary_name": "zsh-common", "binary_version": "5.0.2-3ubuntu6.2" }, { "binary_name": "zsh-dev", "binary_version": "5.0.2-3ubuntu6.2" }, { "binary_name": "zsh-static", "binary_version": "5.0.2-3ubuntu6.2" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "zsh", "binary_version": "5.1.1-1ubuntu2.2" }, { "binary_name": "zsh-common", "binary_version": "5.1.1-1ubuntu2.2" }, { "binary_name": "zsh-dev", "binary_version": "5.1.1-1ubuntu2.2" }, { "binary_name": "zsh-static", "binary_version": "5.1.1-1ubuntu2.2" } ] }