Amazon Linux 2 Security Advisory: ALAS-2020-1439
Advisory Release Date: 2020-06-16 18:06 Pacific
Advisory Updated Date: 2020-06-17 23:37 Pacific
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid(). (CVE-2019-20044)
Affected Packages:
zsh
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update zsh to update your system.
aarch64:
zsh-5.7.1-6.amzn2.0.1.aarch64
zsh-debuginfo-5.7.1-6.amzn2.0.1.aarch64
i686:
zsh-5.7.1-6.amzn2.0.1.i686
zsh-debuginfo-5.7.1-6.amzn2.0.1.i686
noarch:
zsh-html-5.7.1-6.amzn2.0.1.noarch
src:
zsh-5.7.1-6.amzn2.0.1.src
x86_64:
zsh-5.7.1-6.amzn2.0.1.x86_64
zsh-debuginfo-5.7.1-6.amzn2.0.1.x86_64