ELSA-2020-0903

ELSA-2020-0903 - zsh security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2020-03-19

Description


[5.5.1-6.el8_1.2]
- improve printing of error messages introduced by the fix of CVE-2019-20044

[5.5.1-6.el8_1.1]
- drop privileges securely when unsetting PRIVILEGED option (CVE-2019-20044)


Related CVEs


CVE-2019-20044

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 8 (aarch64) zsh-5.5.1-6.el8_1.2.src.rpm07fca9009002a49afd202eca14cc4efad2a90de5d45c7a2c96f7f0b5651a13b5-ol8_aarch64_appstream
zsh-5.5.1-6.el8_1.2.src.rpm07fca9009002a49afd202eca14cc4efad2a90de5d45c7a2c96f7f0b5651a13b5-ol8_aarch64_baseos_latest
zsh-5.5.1-6.el8_1.2.src.rpm07fca9009002a49afd202eca14cc4efad2a90de5d45c7a2c96f7f0b5651a13b5-ol8_aarch64_u2_baseos_base
zsh-5.5.1-6.el8_1.2.src.rpm07fca9009002a49afd202eca14cc4efad2a90de5d45c7a2c96f7f0b5651a13b5-ol8_aarch64_u3_baseos_base
zsh-5.5.1-6.el8_1.2.src.rpm07fca9009002a49afd202eca14cc4efad2a90de5d45c7a2c96f7f0b5651a13b5-ol8_aarch64_u4_baseos_base
zsh-5.5.1-6.el8_1.2.src.rpm07fca9009002a49afd202eca14cc4efad2a90de5d45c7a2c96f7f0b5651a13b5-ol8_aarch64_u5_baseos_base
zsh-5.5.1-6.el8_1.2.aarch64.rpmdd3f0faa124540d004152b5499da7628ccc68ce86c40f2626466db12a7122cd2-ol8_aarch64_baseos_latest
zsh-5.5.1-6.el8_1.2.aarch64.rpmdd3f0faa124540d004152b5499da7628ccc68ce86c40f2626466db12a7122cd2-ol8_aarch64_u2_baseos_base
zsh-5.5.1-6.el8_1.2.aarch64.rpmdd3f0faa124540d004152b5499da7628ccc68ce86c40f2626466db12a7122cd2-ol8_aarch64_u3_baseos_base
zsh-5.5.1-6.el8_1.2.aarch64.rpmdd3f0faa124540d004152b5499da7628ccc68ce86c40f2626466db12a7122cd2-ol8_aarch64_u4_baseos_base
zsh-5.5.1-6.el8_1.2.aarch64.rpmdd3f0faa124540d004152b5499da7628ccc68ce86c40f2626466db12a7122cd2-ol8_aarch64_u5_baseos_base
zsh-html-5.5.1-6.el8_1.2.noarch.rpmfdeec4fe35a783e96f4902d1fef38472958a1d1d637e07eed5723f94b8e142e0-ol8_aarch64_appstream
Oracle Linux 8 (x86_64) zsh-5.5.1-6.el8_1.2.src.rpm07fca9009002a49afd202eca14cc4efad2a90de5d45c7a2c96f7f0b5651a13b5-ol8_x86_64_appstream
zsh-5.5.1-6.el8_1.2.src.rpm07fca9009002a49afd202eca14cc4efad2a90de5d45c7a2c96f7f0b5651a13b5-ol8_x86_64_baseos_latest
zsh-5.5.1-6.el8_1.2.src.rpm07fca9009002a49afd202eca14cc4efad2a90de5d45c7a2c96f7f0b5651a13b5-ol8_x86_64_u1_baseos_patch
zsh-5.5.1-6.el8_1.2.src.rpm07fca9009002a49afd202eca14cc4efad2a90de5d45c7a2c96f7f0b5651a13b5-ol8_x86_64_u2_baseos_base
zsh-5.5.1-6.el8_1.2.src.rpm07fca9009002a49afd202eca14cc4efad2a90de5d45c7a2c96f7f0b5651a13b5-ol8_x86_64_u3_baseos_base
zsh-5.5.1-6.el8_1.2.src.rpm07fca9009002a49afd202eca14cc4efad2a90de5d45c7a2c96f7f0b5651a13b5-ol8_x86_64_u4_baseos_base
zsh-5.5.1-6.el8_1.2.src.rpm07fca9009002a49afd202eca14cc4efad2a90de5d45c7a2c96f7f0b5651a13b5-ol8_x86_64_u5_baseos_base
zsh-5.5.1-6.el8_1.2.x86_64.rpm281339547198ba00e020032ea25871b0c24b3629bf4f38b51f3fe67e61cf7985-ol8_x86_64_baseos_latest
zsh-5.5.1-6.el8_1.2.x86_64.rpm281339547198ba00e020032ea25871b0c24b3629bf4f38b51f3fe67e61cf7985-ol8_x86_64_u1_baseos_patch
zsh-5.5.1-6.el8_1.2.x86_64.rpm281339547198ba00e020032ea25871b0c24b3629bf4f38b51f3fe67e61cf7985-ol8_x86_64_u2_baseos_base
zsh-5.5.1-6.el8_1.2.x86_64.rpm281339547198ba00e020032ea25871b0c24b3629bf4f38b51f3fe67e61cf7985-ol8_x86_64_u3_baseos_base
zsh-5.5.1-6.el8_1.2.x86_64.rpm281339547198ba00e020032ea25871b0c24b3629bf4f38b51f3fe67e61cf7985-ol8_x86_64_u4_baseos_base
zsh-5.5.1-6.el8_1.2.x86_64.rpm281339547198ba00e020032ea25871b0c24b3629bf4f38b51f3fe67e61cf7985-ol8_x86_64_u5_baseos_base
zsh-html-5.5.1-6.el8_1.2.noarch.rpmfdeec4fe35a783e96f4902d1fef38472958a1d1d637e07eed5723f94b8e142e0-ol8_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete