Amazon Linux 1 Security Advisory: ALAS-2020-1411
Advisory Release Date: 2020-07-28 17:21 Pacific
Advisory Updated Date: 2020-07-29 21:31 Pacific
This issue only affects the 'curl' command line utility. Additionally, this is only an issue when using the '-J' (with the '-O' option) and '-i' command line options combined. In most cases, there is nothing to gain for a local attacker here: the curl command line utility is likely running with the same privileges as the user, and thus the user can already overwrite all the files curl could overwrite. However, a local user will have to call curl with the '-J' and '-i' command line options while requesting content from a malicious server, which then opens up an opportunity for the malicious server to overwrite local files. (CVE-2020-8177)
Affected Packages:
curl
Issue Correction:
Run yum update curl to update your system.
i686:
curl-debuginfo-7.61.1-12.94.amzn1.i686
libcurl-devel-7.61.1-12.94.amzn1.i686
libcurl-7.61.1-12.94.amzn1.i686
curl-7.61.1-12.94.amzn1.i686
src:
curl-7.61.1-12.94.amzn1.src
x86_64:
curl-debuginfo-7.61.1-12.94.amzn1.x86_64
libcurl-7.61.1-12.94.amzn1.x86_64
libcurl-devel-7.61.1-12.94.amzn1.x86_64
curl-7.61.1-12.94.amzn1.x86_64