In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the –no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().
The product attempts to drop privileges but does not check or incorrectly checks to see if the drop succeeded.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Zsh | Zsh | * | 5.8 (excluding) |
Red Hat Enterprise Linux 6 | RedHat | zsh-0:4.3.11-11.el6_10 | * |
Red Hat Enterprise Linux 7 | RedHat | zsh-0:5.0.2-34.el7_7.2 | * |
Red Hat Enterprise Linux 8 | RedHat | zsh-0:5.5.1-6.el8_1.2 | * |
Red Hat Enterprise Linux 8 | RedHat | zsh-0:5.5.1-6.el8_1.2 | * |
Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions | RedHat | zsh-0:5.5.1-6.el8_0.2 | * |
Zsh | Ubuntu | bionic | * |
Zsh | Ubuntu | eoan | * |
Zsh | Ubuntu | esm-infra/xenial | * |
Zsh | Ubuntu | trusty | * |
Zsh | Ubuntu | upstream | * |
Zsh | Ubuntu | xenial | * |