patch-2.6-8.AXS4

エラータID: AXSA:2018-2973:01

Release date: 
Tuesday, April 24, 2018 - 00:50
Subject: 
patch-2.6-8.AXS4
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

The patch program applies diff files to originals. The diff command is used to compare an original to a changed file. Diff lists the changes made to the file. A person who has the original file can then use the patch command with the diff file to add the changes to their original file (patching the file).

Patch should be installed because it is a common way of upgrading applications.

Security Fix(es):

* patch: Malicious patch files cause ed to execute arbitrary commands (CVE-2018-1000156)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2018-1000156
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. patch-2.6-8.AXS4.src.rpm
    MD5: 3af5aa5d6ef5c0caa1187d55ffdf709a
    SHA-256: f67e3994bfec83d1cbdf24645dd8efa76ae36a821681a9e439739479ab179faa
    Size: 256.20 kB

Asianux Server 4 for x86
  1. patch-2.6-8.AXS4.i686.rpm
    MD5: db7e2447545cc272d8995722befb0bd3
    SHA-256: daa08191546f5edd0a8a3c3f5959e81c7b04690353f4c4d0d8659e0275156d6c
    Size: 96.37 kB

Asianux Server 4 for x86_64
  1. patch-2.6-8.AXS4.x86_64.rpm
    MD5: e452f47f80d4fa84569adc047b4177e4
    SHA-256: b5c76a8159441beb02a0d365c0dc8fcdd20f093fa3a940ab4e32b9f188443862
    Size: 90.08 kB