SB2022030437 - SUSE update for zsh 



SB2022030437 - SUSE update for zsh

Published: March 4, 2022

Security Bulletin ID SB2022030437
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Improper Check for Dropped Privileges (CVE-ID: CVE-2019-20044)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to Zsh fails to overwrite the saved uid, so the original privileges, dropped by the --no-PRIVILEGED option, can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid(). A local user can execute arbitrary commands on the system with elevated privileges.


2) OS Command Injection (CVE-ID: CVE-2021-45444)

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to recursive PROMPT_SUBST expansion when processing malicious output. A remote attacker with ability to control the output can inject and execute arbitrary commands on the system with privileges on the current user.



Remediation

Install update from vendor's website.