Lucene search

K
amazonAmazonALAS2-2018-1008
HistoryMay 10, 2018 - 5:06 p.m.

Important: patch

2018-05-1017:06:00
alas.aws.amazon.com
9

8.4 High

AI Score

Confidence

High

0.016 Low

EPSS

Percentile

87.4%

Issue Overview:

Malicious patch files cause ed to execute arbitrary commands
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD’s CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.(CVE-2018-1000156)

Affected Packages:

patch

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update patch to update your system.

New Packages:

src:  
    patch-2.7.1-10.amzn2.src  
  
x86_64:  
    patch-2.7.1-10.amzn2.x86_64  
    patch-debuginfo-2.7.1-10.amzn2.x86_64  

Additional References

Red Hat: CVE-2018-1000156

Mitre: CVE-2018-1000156