zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "5.0.2-3ubuntu6.3", "binary_name": "zsh" }, { "binary_version": "5.0.2-3ubuntu6.3", "binary_name": "zsh-beta" }, { "binary_version": "5.0.2-3ubuntu6.3", "binary_name": "zsh-common" }, { "binary_version": "5.0.2-3ubuntu6.3", "binary_name": "zsh-dev" }, { "binary_version": "5.0.2-3ubuntu6.3", "binary_name": "zsh-static" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "5.1.1-1ubuntu2.3", "binary_name": "zsh" }, { "binary_version": "5.1.1-1ubuntu2.3", "binary_name": "zsh-common" }, { "binary_version": "5.1.1-1ubuntu2.3", "binary_name": "zsh-dev" }, { "binary_version": "5.1.1-1ubuntu2.3", "binary_name": "zsh-static" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "5.4.2-3ubuntu3.1", "binary_name": "zsh" }, { "binary_version": "5.4.2-3ubuntu3.1", "binary_name": "zsh-common" }, { "binary_version": "5.4.2-3ubuntu3.1", "binary_name": "zsh-dev" }, { "binary_version": "5.4.2-3ubuntu3.1", "binary_name": "zsh-static" } ] }