ALAS-2018-1008


Amazon Linux 1 Security Advisory: ALAS-2018-1008
Advisory Release Date: 2018-05-10 16:52 Pacific
Advisory Updated Date: 2018-05-10 23:29 Pacific
Severity: Important

Issue Overview:

Malicious patch files cause ed to execute arbitrary commands
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.(CVE-2018-1000156)


Affected Packages:

patch


Issue Correction:
Run yum update patch to update your system.

New Packages:
i686:
    patch-debuginfo-2.7.1-10.10.amzn1.i686
    patch-2.7.1-10.10.amzn1.i686

src:
    patch-2.7.1-10.10.amzn1.src

x86_64:
    patch-2.7.1-10.10.amzn1.x86_64
    patch-debuginfo-2.7.1-10.10.amzn1.x86_64