Amazon Linux 1 Security Advisory: ALAS-2018-1008
Advisory Release Date: 2018-05-10 16:52 Pacific
Advisory Updated Date: 2018-05-10 23:29 Pacific
Malicious patch files cause ed to execute arbitrary commands
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.(CVE-2018-1000156)
Affected Packages:
patch
Issue Correction:
Run yum update patch to update your system.
i686:
patch-debuginfo-2.7.1-10.10.amzn1.i686
patch-2.7.1-10.10.amzn1.i686
src:
patch-2.7.1-10.10.amzn1.src
x86_64:
patch-2.7.1-10.10.amzn1.x86_64
patch-debuginfo-2.7.1-10.10.amzn1.x86_64