Command injection vulnerability in the DHCP client NetworkManager integration script
A command injection flaw was found in the NetworkManager integration script included in the DHCP client packages in Amazon Linux 2. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol. (CVE-2018-1111 )
Note: As mentioned above, the fix for this issue is in the NetworkManager integration script included with the dhcp package. The severity of this advisory has been lowered to a low as the Amazon Linux AMI does not use NetworkManager.
Run yum update dhcp to update your system.
i686: dhcp-devel-4.1.1-53.P1.28.amzn1.i686 dhcp-debuginfo-4.1.1-53.P1.28.amzn1.i686 dhcp-common-4.1.1-53.P1.28.amzn1.i686 dhcp-4.1.1-53.P1.28.amzn1.i686 dhclient-4.1.1-53.P1.28.amzn1.i686 src: dhcp-4.1.1-53.P1.28.amzn1.src x86_64: dhcp-debuginfo-4.1.1-53.P1.28.amzn1.x86_64 dhcp-devel-4.1.1-53.P1.28.amzn1.x86_64 dhcp-4.1.1-53.P1.28.amzn1.x86_64 dhclient-4.1.1-53.P1.28.amzn1.x86_64 dhcp-common-4.1.1-53.P1.28.amzn1.x86_64