Vulnerabilities > CVE-2019-20044 - Improper Check for Dropped Privileges vulnerability in multiple products
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-202003-55.NASL description The remote host is affected by the vulnerability described in GLSA-202003-55 (Zsh: Privilege escalation) It was discovered that Zsh was insecure dropping privileges when unsetting PRIVILEGED option. Impact : An attacker could escalate privileges. Workaround : There is no known workaround at this time. last seen 2020-03-31 modified 2020-03-26 plugin id 134930 published 2020-03-26 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/134930 title GLSA-202003-55 : Zsh: Privilege escalation code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 202003-55. # # The advisory text is Copyright (C) 2001-2020 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(134930); script_version("1.2"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/30"); script_cve_id("CVE-2019-20044"); script_xref(name:"GLSA", value:"202003-55"); script_name(english:"GLSA-202003-55 : Zsh: Privilege escalation"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-202003-55 (Zsh: Privilege escalation) It was discovered that Zsh was insecure dropping privileges when unsetting PRIVILEGED option. Impact : An attacker could escalate privileges. Workaround : There is no known workaround at this time." ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/202003-55" ); script_set_attribute( attribute:"solution", value: "All Zsh users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=app-shells/zsh-5.8'" ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:zsh"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"vuln_publication_date", value:"2020/02/24"); script_set_attribute(attribute:"patch_publication_date", value:"2020/03/25"); script_set_attribute(attribute:"plugin_publication_date", value:"2020/03/26"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"app-shells/zsh", unaffected:make_list("ge 5.8"), vulnerable:make_list("lt 5.8"))) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get()); else security_hole(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Zsh"); }
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2020-0978.NASL description The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:0978 advisory. - zsh: insecure dropping of privileges when unsetting PRIVILEGED option (CVE-2019-20044) Note that Nessus has not tested for this issue but has instead relied only on the application last seen 2020-04-23 modified 2020-03-26 plugin id 134939 published 2020-03-26 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/134939 title RHEL 8 : zsh (RHSA-2020:0978) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Red Hat Security Advisory RHSA-2020:0978. The text # itself is copyright (C) Red Hat, Inc. # include('compat.inc'); if (description) { script_id(134939); script_version("1.2"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/21"); script_cve_id("CVE-2019-20044"); script_xref(name:"RHSA", value:"2020:0978"); script_name(english:"RHEL 8 : zsh (RHSA-2020:0978)"); script_summary(english:"Checks the rpm output for the updated packages"); script_set_attribute(attribute:"synopsis", value: "The remote Red Hat host is missing a security update."); script_set_attribute(attribute:"description", value: "The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:0978 advisory. - zsh: insecure dropping of privileges when unsetting PRIVILEGED option (CVE-2019-20044) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number."); script_set_attribute(attribute:"see_also", value:"https://cwe.mitre.org/data/definitions/271.html"); script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2020:0978"); script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2019-20044"); script_set_attribute(attribute:"solution", value: "Update the affected zsh, zsh-debugsource and / or zsh-html packages."); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-20044"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_cwe_id(271); script_set_attribute(attribute:"vuln_publication_date", value:"2020/02/24"); script_set_attribute(attribute:"patch_publication_date", value:"2020/03/26"); script_set_attribute(attribute:"plugin_publication_date", value:"2020/03/26"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:redhat:rhel_e4s:8.0"); script_set_attribute(attribute:"cpe", value:"cpe:/a:redhat:rhel_e4s:8.0::appstream"); script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:8.0"); script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:rhel_e4s:8.0"); script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:rhel_e4s:8.0::baseos"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:zsh"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:zsh-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:zsh-html"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Red Hat Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu"); exit(0); } include('audit.inc'); include('global_settings.inc'); include('misc_func.inc'); include('rpm.inc'); if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item('Host/RedHat/release'); if (isnull(release) || 'Red Hat' >!< release) audit(AUDIT_OS_NOT, 'Red Hat'); os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat'); os_ver = os_ver[1]; if (! preg(pattern:"^8([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, 'Red Hat 8.x', 'Red Hat ' + os_ver); if (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item('Host/cpu'); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu); pkgs = [ {'reference':'zsh-5.5.1-6.el8_0.2', 'cpu':'aarch64', 'release':'8'}, {'reference':'zsh-5.5.1-6.el8_0.2', 'cpu':'s390x', 'release':'8'}, {'reference':'zsh-5.5.1-6.el8_0.2', 'cpu':'x86_64', 'release':'8'}, {'reference':'zsh-debugsource-5.5.1-6.el8_0.2', 'cpu':'aarch64', 'release':'8'}, {'reference':'zsh-debugsource-5.5.1-6.el8_0.2', 'cpu':'s390x', 'release':'8'}, {'reference':'zsh-debugsource-5.5.1-6.el8_0.2', 'cpu':'x86_64', 'release':'8'}, {'reference':'zsh-html-5.5.1-6.el8_0.2', 'release':'8'} ]; flag = 0; foreach package_array ( pkgs ) { reference = NULL; release = NULL; sp = NULL; cpu = NULL; el_string = NULL; rpm_spec_vers_cmp = NULL; epoch = NULL; if (!empty_or_null(package_array['reference'])) reference = package_array['reference']; if (!empty_or_null(package_array['release'])) release = 'RHEL' + package_array['release']; if (!empty_or_null(package_array['sp'])) sp = package_array['sp']; if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu']; if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string']; if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp']; if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch']; if (reference && release) { if (rpm_spec_vers_cmp) { if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:TRUE)) flag++; } else { if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch)) flag++; } } } if (flag) { security_report_v4( port : 0, severity : SECURITY_HOLE, extra : rpm_report_get() + redhat_report_package_caveat() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'zsh / zsh-debugsource / zsh-html'); }
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2020-0892.NASL description The remote Redhat Enterprise Linux 6 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:0892 advisory. - zsh: insecure dropping of privileges when unsetting PRIVILEGED option (CVE-2019-20044) Note that Nessus has not tested for this issue but has instead relied only on the application last seen 2020-04-23 modified 2020-03-18 plugin id 134675 published 2020-03-18 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/134675 title RHEL 6 : zsh (RHSA-2020:0892) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2020-0853.NASL description From Red Hat Security Advisory 2020:0853 : The remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:0853 advisory. - zsh: insecure dropping of privileges when unsetting PRIVILEGED option (CVE-2019-20044) Note that Nessus has not tested for this issue but has instead relied only on the application last seen 2020-05-21 modified 2020-03-19 plugin id 134690 published 2020-03-19 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/134690 title Oracle Linux 7 : zsh (ELSA-2020-0853) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2020-0853.NASL description The remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:0853 advisory. - zsh: insecure dropping of privileges when unsetting PRIVILEGED option (CVE-2019-20044) Note that Nessus has not tested for this issue but has instead relied only on the application last seen 2020-05-21 modified 2020-03-26 plugin id 134905 published 2020-03-26 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/134905 title CentOS 7 : zsh (CESA-2020:0853) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2020-0853.NASL description The remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:0853 advisory. - zsh: insecure dropping of privileges when unsetting PRIVILEGED option (CVE-2019-20044) Note that Nessus has not tested for this issue but has instead relied only on the application last seen 2020-04-23 modified 2020-03-18 plugin id 134672 published 2020-03-18 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/134672 title RHEL 7 : zsh (RHSA-2020:0853) NASL family Fedora Local Security Checks NASL id FEDORA_2020-3F38F3E517.NASL description - drop privileges securely when unsetting PRIVILEGED option (CVE-2019-20044) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-03-19 modified 2020-03-13 plugin id 134458 published 2020-03-13 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/134458 title Fedora 31 : zsh (2020-3f38f3e517) NASL family Scientific Linux Local Security Checks NASL id SL_20200318_ZSH_ON_SL6_X.NASL description Security Fix(es) : - zsh: insecure dropping of privileges when unsetting PRIVILEGED option (CVE-2019-20044) last seen 2020-03-24 modified 2020-03-19 plugin id 134695 published 2020-03-19 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/134695 title Scientific Linux Security Update : zsh on SL6.x i386/x86_64 (20200318) NASL family PhotonOS Local Security Checks NASL id PHOTONOS_PHSA-2020-3_0-0073_ZSH.NASL description An update of the zsh package has been released. last seen 2020-04-14 modified 2020-04-12 plugin id 135406 published 2020-04-12 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/135406 title Photon OS 3.0: Zsh PHSA-2020-3.0-0073 NASL family Fedora Local Security Checks NASL id FEDORA_2020-9009363F0F.NASL description - drop privileges securely when unsetting PRIVILEGED option (CVE-2019-20044) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-03-19 modified 2020-03-13 plugin id 134460 published 2020-03-13 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/134460 title Fedora 30 : zsh (2020-9009363f0f) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2020-1329.NASL description According to the version of the zsh package installed, the EulerOS installation on the remote host is affected by the following vulnerability : - In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().(CVE-2019-20044) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-05-06 modified 2020-03-23 plugin id 134820 published 2020-03-23 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/134820 title EulerOS 2.0 SP5 : zsh (EulerOS-SA-2020-1329) NASL family MacOS X Local Security Checks NASL id MACOS_HT211170.NASL description The remote host is running a version of macOS / Mac OS X that is 10.15.x prior to 10.15.5, 10.13.x prior to 10.13.6 Security Update 2020-003, 10.14.x prior to 10.14.6 Security Update 2020-003. It is, therefore, affected by multiple vulnerabilities: - In ksh version 20120801, a flaw was found in the way it evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely. (CVE-2019-14868) - In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid(). (CVE-2019-20044) - An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, macOS Catalina 10.15.3, tvOS 13.3.1, watchOS 6.1.2. Processing a maliciously crafted image may lead to arbitrary code execution. (CVE-2020-3878) Note that Nessus has not tested for this issue but has instead relied only on the operating system last seen 2020-06-12 modified 2020-05-28 plugin id 136930 published 2020-05-28 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/136930 title macOS 10.15.x < 10.15.5 / 10.14.x < 10.14.6 Security Update 2020-003 / 10.13.x < 10.13.6 Security Update 2020-003 NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2020-0903.NASL description The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:0903 advisory. - zsh: insecure dropping of privileges when unsetting PRIVILEGED option (CVE-2019-20044) Note that Nessus has not tested for this issue but has instead relied only on the application last seen 2020-04-23 modified 2020-03-23 plugin id 134829 published 2020-03-23 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/134829 title RHEL 8 : zsh (RHSA-2020:0903) NASL family PhotonOS Local Security Checks NASL id PHOTONOS_PHSA-2020-2_0-0229_ZSH.NASL description An update of the zsh package has been released. last seen 2020-04-30 modified 2020-04-22 plugin id 135870 published 2020-04-22 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/135870 title Photon OS 2.0: Zsh PHSA-2020-2.0-0229 NASL family Scientific Linux Local Security Checks NASL id SL_20200317_ZSH_ON_SL7_X.NASL description Security Fix(es) : - zsh: insecure dropping of privileges when unsetting PRIVILEGED option (CVE-2019-20044) last seen 2020-03-21 modified 2020-03-18 plugin id 134652 published 2020-03-18 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/134652 title Scientific Linux Security Update : zsh on SL7.x x86_64 (20200317) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2020-0892.NASL description From Red Hat Security Advisory 2020:0892 : The remote Redhat Enterprise Linux 6 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:0892 advisory. - zsh: insecure dropping of privileges when unsetting PRIVILEGED option (CVE-2019-20044) Note that Nessus has not tested for this issue but has instead relied only on the application last seen 2020-06-06 modified 2020-03-20 plugin id 134750 published 2020-03-20 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/134750 title Oracle Linux 6 : zsh (ELSA-2020-0892) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2020-0892.NASL description The remote Redhat Enterprise Linux 6 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:0892 advisory. - zsh: insecure dropping of privileges when unsetting PRIVILEGED option (CVE-2019-20044) Note that Nessus has not tested for this issue but has instead relied only on the application last seen 2020-06-06 modified 2020-03-26 plugin id 134907 published 2020-03-26 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/134907 title CentOS 6 : zsh (CESA-2020:0892) NASL family Debian Local Security Checks NASL id DEBIAN_DLA-2117.NASL description A privilege escalation vulnerability was discovered in zsh, a shell with lots of features, whereby a user could regain a formerly elevated privelege level even when such an action should not be permitted. For Debian 8 last seen 2020-03-17 modified 2020-03-06 plugin id 134241 published 2020-03-06 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/134241 title Debian DLA-2117-1 : zsh security update
Redhat
advisories |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
rpms |
|
References
- http://seclists.org/fulldisclosure/2020/May/49
- http://seclists.org/fulldisclosure/2020/May/49
- http://seclists.org/fulldisclosure/2020/May/53
- http://seclists.org/fulldisclosure/2020/May/53
- http://seclists.org/fulldisclosure/2020/May/55
- http://seclists.org/fulldisclosure/2020/May/55
- http://seclists.org/fulldisclosure/2020/May/59
- http://seclists.org/fulldisclosure/2020/May/59
- http://zsh.sourceforge.net/releases.html
- http://zsh.sourceforge.net/releases.html
- https://github.com/XMB5/zsh-privileged-upgrade
- https://github.com/XMB5/zsh-privileged-upgrade
- https://lists.debian.org/debian-lts-announce/2020/03/msg00004.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00004.html
- https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html
- https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FP64FFIZI2CKQOEAOI5A72PVQULE7ZZC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FP64FFIZI2CKQOEAOI5A72PVQULE7ZZC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PN5V7MPHRRP7QNHOEK56S7QGRU53WUN6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PN5V7MPHRRP7QNHOEK56S7QGRU53WUN6/
- https://security.gentoo.org/glsa/202003-55
- https://security.gentoo.org/glsa/202003-55
- https://support.apple.com/HT211168
- https://support.apple.com/HT211168
- https://support.apple.com/HT211170
- https://support.apple.com/HT211170
- https://support.apple.com/HT211171
- https://support.apple.com/HT211171
- https://support.apple.com/HT211175
- https://support.apple.com/HT211175
- https://support.apple.com/kb/HT211168
- https://support.apple.com/kb/HT211168
- https://support.apple.com/kb/HT211170
- https://support.apple.com/kb/HT211170
- https://support.apple.com/kb/HT211171
- https://support.apple.com/kb/HT211171
- https://support.apple.com/kb/HT211175
- https://support.apple.com/kb/HT211175
- https://www.zsh.org/mla/zsh-announce/141
- https://www.zsh.org/mla/zsh-announce/141