It was discovered that ZenLib doesn't check the return value of a specific operation before using it. An attacker could use a specially crafted input to crash programs using the library.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "0.4.29-1ubuntu0.1~esm1", "binary_name": "libzen-dev" }, { "binary_version": "0.4.29-1ubuntu0.1~esm1", "binary_name": "libzen-doc" }, { "binary_version": "0.4.29-1ubuntu0.1~esm1", "binary_name": "libzen0" }, { "binary_version": "0.4.29-1ubuntu0.1~esm1", "binary_name": "libzen0-dbgsym" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "0.4.32-1ubuntu0.16.04.1+esm1", "binary_name": "libzen-dev" }, { "binary_version": "0.4.32-1ubuntu0.16.04.1+esm1", "binary_name": "libzen-doc" }, { "binary_version": "0.4.32-1ubuntu0.16.04.1+esm1", "binary_name": "libzen0v5" }, { "binary_version": "0.4.32-1ubuntu0.16.04.1+esm1", "binary_name": "libzen0v5-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "0.4.37-1ubuntu0.18.04.1", "binary_name": "libzen-dev" }, { "binary_version": "0.4.37-1ubuntu0.18.04.1", "binary_name": "libzen-doc" }, { "binary_version": "0.4.37-1ubuntu0.18.04.1", "binary_name": "libzen0v5" }, { "binary_version": "0.4.37-1ubuntu0.18.04.1", "binary_name": "libzen0v5-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "0.4.37-1ubuntu0.20.04.1", "binary_name": "libzen-dev" }, { "binary_version": "0.4.37-1ubuntu0.20.04.1", "binary_name": "libzen-doc" }, { "binary_version": "0.4.37-1ubuntu0.20.04.1", "binary_name": "libzen0v5" }, { "binary_version": "0.4.37-1ubuntu0.20.04.1", "binary_name": "libzen0v5-dbgsym" } ] }