Bug 47528 - patch: Multiple issues (4.2)
patch: Multiple issues (4.2)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.2
All Linux
: P3 normal (vote)
: UCS 4.2-4-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-08-09 10:18 CEST by Quality Assurance
Modified: 2018-08-15 16:20 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) NVD


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2018-08-09 10:18:01 CEST
New Debian patch 2.7.5-1+deb8u1 fixes:
This update addresses the following issue(s):
* 
CVE_2010-4651 is open
CVE_2016-10713 is open
CVE_2018-6951 is open
CVE_2018-6952 is open
* GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time. (CVE-2018-1000156)

2.7.5-1+deb8u1 (Mon, 16 Apr 2018 20:48:14 +0000) * Fix CVE-2018-1000156: arbitrary command execution in ed-style patches
.
* CVE-2018-1000156 patch: Malicious patch files cause ed to execute arbitrary commands (CVE-2018-1000156)
* The do_ed_script function in pch.c in GNU patch through 2.7.6, and patch in FreeBSD 10.1 before 10.1-RELEASE-p17, 10.2 before 10.2-BETA2-p3, 10.2-RC1 before 10.2-RC1-p2, and 0.2-RC2 before 10.2-RC2-p1, allows remote attackers to execute arbitrary commands via a crafted patch file, because a '!' character can be passed to the ed program. (CVE-2015-1418)
Comment 1 Quality Assurance univentionstaff 2018-08-09 18:48:18 CEST
--- mirror/ftp/4.2/unmaintained/4.2-0/source/patch_2.7.5-1.dsc
+++ apt/ucs_4.2-0-errata4.2-4/source/patch_2.7.5-1+deb8u1.dsc
@@ -1,3 +1,8 @@
+2.7.5-1+deb8u1 [Mon, 16 Apr 2018 20:48:14 +0000] Laszlo Boszormenyi (GCS) <gcs@debian.org>:
+
+  * Fix CVE-2018-1000156: arbitrary command execution in ed-style patches
+      (closes: #894993).
+
 2.7.5-1 [Sat, 07 Mar 2015 06:27:14 +0000] Laszlo Boszormenyi (GCS) <gcs@debian.org>:
 
   * New upstream release.

<http://10.200.17.11/4.2-4/#2678084888108049106>
Comment 2 Philipp Hahn univentionstaff 2018-08-10 11:50:43 CEST
OK: yaml
OK: errata-announce
OK: patch
OK: piuparts

[4.2-4] e443018650 Bug #47528: patch 2.7.5-1+deb8u1
 doc/errata/staging/patch.yaml | 16 +++-------------
 1 file changed, 3 insertions(+), 13 deletions(-)

[4.2-4] 49b8496ef2 Bug #47528: patch 2.7.5-1+deb8u1
 doc/errata/staging/patch.yaml | 23 +++++++++++++++++++++++
 1 file changed, 23 insertions(+)
Comment 3 Arvid Requate univentionstaff 2018-08-15 16:20:06 CEST
<http://errata.software-univention.de/ucs/4.2/471.html>