Issue Overview:
Malicious patch files cause ed to execute arbitrary commands
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD’s CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.(CVE-2018-1000156)
Affected Packages:
patch
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update patch to update your system.
New Packages:
src:
patch-2.7.1-10.amzn2.src
x86_64:
patch-2.7.1-10.amzn2.x86_64
patch-debuginfo-2.7.1-10.amzn2.x86_64
Red Hat: CVE-2018-1000156
Mitre: CVE-2018-1000156
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | x86_64 | patch | < 2.7.1-10.amzn2 | patch-2.7.1-10.amzn2.x86_64.rpm |
Amazon Linux | 2 | x86_64 | patch-debuginfo | < 2.7.1-10.amzn2 | patch-debuginfo-2.7.1-10.amzn2.x86_64.rpm |