In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "30"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "31"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "13.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "13.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "10.15.5"
}
]
},
{
"events": [
{
"introduced": "10.13.0"
},
{
"fixed": "10.13.6"
}
]
},
{
"events": [
{
"introduced": "10.14.0"
},
{
"fixed": "10.14.6"
}
]
},
{
"events": [
{
"introduced": "10.15"
},
{
"fixed": "10.15.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.13.6-NA"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.13.6-security_update_2018\\-002"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.13.6-security_update_2018\\-003"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.13.6-security_update_2019\\-001"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.13.6-security_update_2019\\-002"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.13.6-security_update_2019\\-003"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.13.6-security_update_2019\\-004"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.13.6-security_update_2019\\-005"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.13.6-security_update_2019\\-006"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.13.6-security_update_2019\\-007"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.13.6-security_update_2020\\-001"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.13.6-security_update_2020\\-002"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.14.6-NA"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.14.6-security_update_2019\\-001"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.14.6-security_update_2019\\-002"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.14.6-security_update_2019\\-004"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.14.6-security_update_2019\\-005"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.14.6-security_update_2019\\-006"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.14.6-security_update_2019\\-007"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.14.6-security_update_2020\\-001"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.14.6-security_update_2020\\-002"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "13.4.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.2.5"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-20044.json"