CVE-2021-45444

NameCVE-2021-45444
DescriptionIn zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2926-1, DSA-5078-1, ELA-565-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
zsh (PTS)jessie, jessie (lts)5.0.7-5+deb8u4fixed
stretch (security), stretch (lts), stretch5.3.1-4+deb9u5fixed
buster (security), buster, buster (lts)5.7.1-1+deb10u1fixed
bullseye (security), bullseye5.8-6+deb11u1fixed
bookworm5.9-4fixed
sid, trixie5.9-8fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
zshsourcejessie5.0.7-5+deb8u4ELA-565-1
zshsourcestretch5.3.1-4+deb9u5DLA-2926-1
zshsourcebuster5.7.1-1+deb10u1DSA-5078-1
zshsourcebullseye5.8-6+deb11u1DSA-5078-1
zshsource(unstable)5.8.1-1

Notes

https://sourceforge.net/p/zsh/code/ci/c187154f47697cdbf822c2f9d714d570ed4a0fd1/
https://sourceforge.net/p/zsh/code/ci/fdb8b0ce6244ff26bf55e0fd825310a58d0d3156/
https://sourceforge.net/p/zsh/code/ci/bdc4d70a7e033b754e68a8659a037ea0fc5f38de/

Search for package or bug name: Reporting problems