First published: Sun Feb 13 2022(Updated: )
In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
Credit: CVE-2021-45444 CVE-2021-45444 CVE-2021-45444 cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zsh Zsh | <5.8.1 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Apple Mac OS X | >=10.15<10.15.7 | |
Apple Mac OS X | =10.15.7-security_update_2020 | |
Apple Mac OS X | =10.15.7-security_update_2020-001 | |
Apple Mac OS X | =10.15.7-security_update_2020-005 | |
Apple Mac OS X | =10.15.7-security_update_2020-007 | |
Apple Mac OS X | =10.15.7-security_update_2021-001 | |
Apple Mac OS X | =10.15.7-security_update_2021-002 | |
Apple Mac OS X | =10.15.7-security_update_2021-003 | |
Apple Mac OS X | =10.15.7-security_update_2021-006 | |
Apple Mac OS X | =10.15.7-security_update_2021-007 | |
Apple Mac OS X | =10.15.7-security_update_2021-008 | |
Apple Mac OS X | =10.15.7-security_update_2022-001 | |
Apple Mac OS X | =10.15.7-security_update_2022-002 | |
Apple Mac OS X | =10.15.7-security_update_2022-003 | |
Apple macOS | >=11.0<11.6.6 | |
Apple macOS | >=12.0.0<12.4 | |
Apple Catalina | ||
Apple macOS Big Sur | <11.6.6 | 11.6.6 |
<12.4 | 12.4 | |
debian/zsh | 5.7.1-1+deb10u1 5.8-6+deb11u1 5.9-4 5.9-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-45444 is a vulnerability in zsh that was addressed by updating to zsh version 5.8.1.
CVE-2021-45444 affects Apple macOS Catalina, macOS Big Sur (up to version 11.6.6), and macOS Monterey (up to version 12.4).
To fix CVE-2021-45444, update to zsh version 5.8.1.
You can find more information about CVE-2021-45444 at the following references: [Link 1](https://support.apple.com/en-us/HT213257), [Link 2](https://support.apple.com/en-us/HT213255), [Link 3](https://support.apple.com/en-us/HT213256).