7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8 High
AI Score
Confidence
High
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0005 Low
EPSS
Percentile
15.7%
Issue Overview:
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid(). (CVE-2019-20044)
Affected Packages:
zsh
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update zsh to update your system.
New Packages:
aarch64:
zsh-5.7.1-6.amzn2.0.1.aarch64
zsh-debuginfo-5.7.1-6.amzn2.0.1.aarch64
i686:
zsh-5.7.1-6.amzn2.0.1.i686
zsh-debuginfo-5.7.1-6.amzn2.0.1.i686
noarch:
zsh-html-5.7.1-6.amzn2.0.1.noarch
src:
zsh-5.7.1-6.amzn2.0.1.src
x86_64:
zsh-5.7.1-6.amzn2.0.1.x86_64
zsh-debuginfo-5.7.1-6.amzn2.0.1.x86_64
Red Hat: CVE-2019-20044
Mitre: CVE-2019-20044
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | aarch64 | zsh | < 5.7.1-6.amzn2.0.1 | zsh-5.7.1-6.amzn2.0.1.aarch64.rpm |
Amazon Linux | 2 | aarch64 | zsh-debuginfo | < 5.7.1-6.amzn2.0.1 | zsh-debuginfo-5.7.1-6.amzn2.0.1.aarch64.rpm |
Amazon Linux | 2 | i686 | zsh | < 5.7.1-6.amzn2.0.1 | zsh-5.7.1-6.amzn2.0.1.i686.rpm |
Amazon Linux | 2 | i686 | zsh-debuginfo | < 5.7.1-6.amzn2.0.1 | zsh-debuginfo-5.7.1-6.amzn2.0.1.i686.rpm |
Amazon Linux | 2 | noarch | zsh-html | < 5.7.1-6.amzn2.0.1 | zsh-html-5.7.1-6.amzn2.0.1.noarch.rpm |
Amazon Linux | 2 | x86_64 | zsh | < 5.7.1-6.amzn2.0.1 | zsh-5.7.1-6.amzn2.0.1.x86_64.rpm |
Amazon Linux | 2 | x86_64 | zsh-debuginfo | < 5.7.1-6.amzn2.0.1 | zsh-debuginfo-5.7.1-6.amzn2.0.1.x86_64.rpm |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8 High
AI Score
Confidence
High
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0005 Low
EPSS
Percentile
15.7%