Описание
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().
A flaw was found in zsh. When unsetting the PRIVILEGED option, the shell sets its effective user and group IDs to match their respective real IDs. When the RUID and EUID were both non-zero, it is possible to regain the shell's former privileges. Also, the setopt built-in did not correctly report errors when unsetting the option, which prevented users from handling them as the documentation recommended. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | zsh | Out of support scope | ||
| Red Hat Enterprise Linux 6 | zsh | Fixed | RHSA-2020:0892 | 18.03.2020 |
| Red Hat Enterprise Linux 7 | zsh | Fixed | RHSA-2020:0853 | 17.03.2020 |
| Red Hat Enterprise Linux 8 | zsh | Fixed | RHSA-2020:0903 | 19.03.2020 |
| Red Hat Enterprise Linux 8 | zsh | Fixed | RHSA-2020:0903 | 19.03.2020 |
| Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions | zsh | Fixed | RHSA-2020:0978 | 26.03.2020 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.8 High
CVSS3
Связанные уязвимости
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().
In Zsh before 5.8, attackers able to execute commands can regain privi ...
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().
EPSS
7.8 High
CVSS3