ALAS-2018-1008 ---- patchID: oval:org.secpod.oval:def:1600885 | Date: (C)2018-05-15 (M)2021-09-11 |
Class: PATCH | Family: unix |
Malicious patch files cause ed to execute arbitrary commandsGNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD#039;s CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
Platform: |
Amazon Linux AMI |