ALAS2-2020-1439

Related Vulnerabilities: CVE-2019-20044  

In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid(). (CVE-2019-20044)

ALAS2-2020-1439


Amazon Linux 2 Security Advisory: ALAS-2020-1439
Advisory Release Date: 2020-06-16 18:06 Pacific
Advisory Updated Date: 2020-06-17 23:37 Pacific
Severity: Important
References: CVE-2019-20044 

Issue Overview:

In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid(). (CVE-2019-20044)


Affected Packages:

zsh


Issue Correction:
Run yum update zsh to update your system.

New Packages:
aarch64:
    zsh-5.7.1-6.amzn2.0.1.aarch64
    zsh-debuginfo-5.7.1-6.amzn2.0.1.aarch64

i686:
    zsh-5.7.1-6.amzn2.0.1.i686
    zsh-debuginfo-5.7.1-6.amzn2.0.1.i686

noarch:
    zsh-html-5.7.1-6.amzn2.0.1.noarch

src:
    zsh-5.7.1-6.amzn2.0.1.src

x86_64:
    zsh-5.7.1-6.amzn2.0.1.x86_64
    zsh-debuginfo-5.7.1-6.amzn2.0.1.x86_64