Updated: 2025-08-20 00:08:12.15677
Description:
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | HIGH | 7.2 |
| CVSS Version 3.x | HIGH | 7.8 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| Debian 10 ELS | zsh | 5.7.1 | 7.8 | HIGH | Released | CLSA-2025:1761673667 | 2025-10-28 22:51:15 | |
| Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 7.8 | HIGH | Not Vulnerable | 2022-10-04 14:02:37 | ||
| Ubuntu 16.04 ELS | linux | 4.4.0 | 7.8 | HIGH | Not Vulnerable | 2022-04-11 16:02:48 | ||
| Ubuntu 16.04 ELS | zsh | 5.1.1-1 | 7.8 | HIGH | Released | CLSA-2022:1648138003 | 2022-03-24 18:56:27 |