Loading
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().
Cite this page
CVE-2019-20044. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2019-20044
Use CWE-273, Zsh vendor hub and Zsh product page to widen CVE-2019-20044 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2018-13259, CVE-2018-0502 and CVE-2018-7548 for nearby disclosures in the same product family.