Debian Zsh vulnerabilities
16 known vulnerabilities affecting debian/zsh.
Total CVEs
16
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL6HIGH4LOW6
Vulnerabilities
Page 1 of 1
CVE-2021-45444HIGHCVSS 7.8fixed in zsh 5.8.1-1 (bookworm)2021
CVE-2021-45444 [HIGH] CVE-2021-45444: zsh - In zsh before 5.8.1, an attacker can achieve code execution if they control a co...
In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
Scope: local
bookworm: resolved (fixed in 5.8.1-1)
bullseye: resolved (fixed in 5.8-6+deb11u1)
forky: resolved (fixed in 5.8.1-1)
sid: resolved (fixed in 5.8.1-1)
trixie
debian
CVE-2019-20044HIGHCVSS 7.8fixed in zsh 5.8-1 (bookworm)2019
CVE-2019-20044 [HIGH] CVE-2019-20044: zsh - In Zsh before 5.8, attackers able to execute commands can regain privileges drop...
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().
Scope: local
bookworm: resolved (fixed in 5.8-1)
bullseye: resolved (fixed in 5.8-1)
forky
debian
CVE-2018-13259CRITICALCVSS 9.8fixed in zsh 5.6-1 (bookworm)2018
CVE-2018-13259 [CRITICAL] CVE-2018-13259: zsh - An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters...
An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program name that is a substring of the intended one.
Scope: local
bookworm: resolved (fixed in 5.6-1)
bullseye: resolved (fixed in 5.6-1)
forky: resolved (fixed in 5.6-1)
sid: resolved (fixed in 5.6-1)
trixie: resolved (fixed i
debian
CVE-2018-0502CRITICALCVSS 9.8fixed in zsh 5.6-1 (bookworm)2018
CVE-2018-0502 [CRITICAL] CVE-2018-0502: zsh - An issue was discovered in zsh before 5.6. The beginning of a #! script file was...
An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line.
Scope: local
bookworm: resolved (fixed in 5.6-1)
bullseye: resolved (fixed in 5.6-1)
forky: resolved (fixed in 5.6-1)
sid: resolved (fixed in 5.6-1)
trixie: resolved (fixed in 5.6-1)
debian
CVE-2018-1100HIGHCVSS 7.8fixed in zsh 5.5-1 (bookworm)2018
CVE-2018-1100 [HIGH] CVE-2018-1100: zsh - zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the ...
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.
Scope: local
bookworm: resolved (fixed in 5.5-1)
bullseye: resolved (fixed in 5.5-1)
forky: resolved (fixed in 5.5-1)
sid: resolved (fixed in 5.5-1)
trixie: resolved (f
debian
CVE-2018-7549LOWCVSS 7.5fixed in zsh 5.5-1 (bookworm)2018
CVE-2018-7549 [HIGH] CVE-2018-7549: zsh - In params.c in zsh through 5.4.2, there is a crash during a copy of an empty has...
In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p.
Scope: local
bookworm: resolved (fixed in 5.5-1)
bullseye: resolved (fixed in 5.5-1)
forky: resolved (fixed in 5.5-1)
sid: resolved (fixed in 5.5-1)
trixie: resolved (fixed in 5.5-1)
debian
CVE-2018-7548LOWCVSS 9.8fixed in zsh 5.5-1 (bookworm)2018
CVE-2018-7548 [CRITICAL] CVE-2018-7548: zsh - In subst.c in zsh through 5.4.2, there is a NULL pointer dereference when using ...
In subst.c in zsh through 5.4.2, there is a NULL pointer dereference when using ${(PA)...} on an empty array result.
Scope: local
bookworm: resolved (fixed in 5.5-1)
bullseye: resolved (fixed in 5.5-1)
forky: resolved (fixed in 5.5-1)
sid: resolved (fixed in 5.5-1)
trixie: resolved (fixed in 5.5-1)
debian
CVE-2018-1083LOWCVSS 7.8fixed in zsh 5.4.2-4 (bookworm)2018
CVE-2018-1083 [HIGH] CVE-2018-1083: zsh - Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell ...
Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalati
debian
CVE-2018-1071LOWCVSS 5.5fixed in zsh 5.4.2-4 (bookworm)2018
CVE-2018-1071 [MEDIUM] CVE-2018-1071: zsh - zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the ...
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.
Scope: local
bookworm: resolved (fixed in 5.4.2-4)
bullseye: resolved (fixed in 5.4.2-4)
forky: resolved (fixed in 5.4.2-4)
sid: resolved (fixed in 5.4.2-4)
trixie: resolved (fixed in 5.4.2-4)
debian
CVE-2017-18206CRITICALCVSS 9.8fixed in zsh 5.4.1-1 (bookworm)2017
CVE-2017-18206 [CRITICAL] CVE-2017-18206: zsh - In utils.c in zsh before 5.4, symlink expansion had a buffer overflow.
In utils.c in zsh before 5.4, symlink expansion had a buffer overflow.
Scope: local
bookworm: resolved (fixed in 5.4.1-1)
bullseye: resolved (fixed in 5.4.1-1)
forky: resolved (fixed in 5.4.1-1)
sid: resolved (fixed in 5.4.1-1)
trixie: resolved (fixed in 5.4.1-1)
debian
CVE-2017-18205LOWCVSS 8.1fixed in zsh 5.4.1-1 (bookworm)2017
CVE-2017-18205 [HIGH] CVE-2017-18205: zsh - In builtin.c in zsh before 5.4, when sh compatibility mode is used, there is a N...
In builtin.c in zsh before 5.4, when sh compatibility mode is used, there is a NULL pointer dereference during processing of the cd command with no argument if HOME is not set.
Scope: local
bookworm: resolved (fixed in 5.4.1-1)
bullseye: resolved (fixed in 5.4.1-1)
forky: resolved (fixed in 5.4.1-1)
sid: resolved (fixed in 5.4.1-1)
trixie: resolved (fixed in 5.4.1-1)
debian
CVE-2016-10714CRITICALCVSS 9.8fixed in zsh 5.3-1 (bookworm)2016
CVE-2016-10714 [CRITICAL] CVE-2016-10714: zsh - In zsh before 5.3, an off-by-one error resulted in undersized buffers that were ...
In zsh before 5.3, an off-by-one error resulted in undersized buffers that were intended to support PATH_MAX characters.
Scope: local
bookworm: resolved (fixed in 5.3-1)
bullseye: resolved (fixed in 5.3-1)
forky: resolved (fixed in 5.3-1)
sid: resolved (fixed in 5.3-1)
trixie: resolved (fixed in 5.3-1)
debian
CVE-2014-10072CRITICALCVSS 9.8fixed in zsh 5.0.6-1 (bookworm)2014
CVE-2014-10072 [CRITICAL] CVE-2014-10072: zsh - In utils.c in zsh before 5.0.6, there is a buffer overflow when scanning very lo...
In utils.c in zsh before 5.0.6, there is a buffer overflow when scanning very long directory paths for symbolic links.
Scope: local
bookworm: resolved (fixed in 5.0.6-1)
bullseye: resolved (fixed in 5.0.6-1)
forky: resolved (fixed in 5.0.6-1)
sid: resolved (fixed in 5.0.6-1)
trixie: resolved (fixed in 5.0.6-1)
debian
CVE-2014-10071CRITICALCVSS 9.8fixed in zsh 5.0.7-3 (bookworm)2014
CVE-2014-10071 [CRITICAL] CVE-2014-10071: zsh - In exec.c in zsh before 5.0.7, there is a buffer overflow for very long fds in t...
In exec.c in zsh before 5.0.7, there is a buffer overflow for very long fds in the ">& fd" syntax.
Scope: local
bookworm: resolved (fixed in 5.0.7-3)
bullseye: resolved (fixed in 5.0.7-3)
forky: resolved (fixed in 5.0.7-3)
sid: resolved (fixed in 5.0.7-3)
trixie: resolved (fixed in 5.0.7-3)
debian
CVE-2014-10070HIGHCVSS 7.8fixed in zsh 5.0.7-3 (bookworm)2014
CVE-2014-10070 [HIGH] CVE-2014-10070: zsh - zsh before 5.0.7 allows evaluation of the initial values of integer variables im...
zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers). That could allow local privilege escalation, under some specific and atypical conditions where zsh is being invoked in privilege-elevation contexts when the environment has not been properly sanitized, such as when zs
debian
CVE-2007-6209LOWCVSS 4.6fixed in zsh 4.3.4-dev-3-2 (bookworm)2007
CVE-2007-6209 [MEDIUM] CVE-2007-6209: zsh - Util/difflog.pl in zsh 4.3.4 allows local users to overwrite arbitrary files via...
Util/difflog.pl in zsh 4.3.4 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
Scope: local
bookworm: resolved (fixed in 4.3.4-dev-3-2)
bullseye: resolved (fixed in 4.3.4-dev-3-2)
forky: resolved (fixed in 4.3.4-dev-3-2)
sid: resolved (fixed in 4.3.4-dev-3-2)
trixie: resolved (fixed in 4.3.4-dev-3-2)
debian