Bug 47485 - patch: Multiple issues (4.3)
patch: Multiple issues (4.3)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.3
All Linux
: P3 normal (vote)
: UCS 4.3-1-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-08-08 07:41 CEST by Quality Assurance
Modified: 2018-08-15 13:14 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) NVD


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2018-08-08 07:41:34 CEST
New Debian patch 2.7.5-1+deb9u1 fixes:
This update addresses the following issue(s):
* 
CVE_2010-4651 is open
CVE_2016-10713 is open
CVE_2018-6951 is open
CVE_2018-6952 is open
* GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time. (CVE-2018-1000156)

2.7.5-1+deb9u1 (Mon, 16 Apr 2018 20:48:43 +0000) * Fix CVE-2018-1000156: arbitrary command execution in ed-style patches
.
* CVE-2018-1000156 patch: Malicious patch files cause ed to execute arbitrary commands (CVE-2018-1000156)
* The do_ed_script function in pch.c in GNU patch through 2.7.6, and patch in FreeBSD 10.1 before 10.1-RELEASE-p17, 10.2 before 10.2-BETA2-p3, 10.2-RC1 before 10.2-RC1-p2, and 0.2-RC2 before 10.2-RC2-p1, allows remote attackers to execute arbitrary commands via a crafted patch file, because a '!' character can be passed to the ed program. (CVE-2015-1418)
Comment 1 Quality Assurance univentionstaff 2018-08-08 19:08:10 CEST
--- mirror/ftp/4.3/unmaintained/4.3-0/source/patch_2.7.5-1.dsc
+++ apt/ucs_4.3-0-errata4.3-1/source/patch_2.7.5-1+deb9u1.dsc
@@ -1,3 +1,8 @@
+2.7.5-1+deb9u1 [Mon, 16 Apr 2018 20:48:43 +0000] Laszlo Boszormenyi (GCS) <gcs@debian.org>:
+
+  * Fix CVE-2018-1000156: arbitrary command execution in ed-style patches
+    (closes: #894993).
+
 2.7.5-1 [Sat, 07 Mar 2015 06:27:14 +0000] Laszlo Boszormenyi (GCS) <gcs@debian.org>:
 
   * New upstream release.

<http://10.200.17.11/4.3-1/#7515565659068437489>
Comment 2 Philipp Hahn univentionstaff 2018-08-09 09:34:22 CEST
OK: patches
OK: piuparts
OK: yaml
OK: errata-announce patch.yaml

[4.3-1] 1160610970 Bug #47485: patch 2.7.5-1+deb9u1
 doc/errata/staging/patch.yaml | 13 +++++++++++++
 1 file changed, 13 insertions(+)
Comment 3 Arvid Requate univentionstaff 2018-08-15 13:14:39 CEST
<http://errata.software-univention.de/ucs/4.3/188.html>