ArchLinux: 201811-14: patch: multiple issues
Summary
- CVE-2018-6952 (denial of service)
A double free exists in the another_hunk function in pch.c in GNU patch
through 2.7.6. An attacker could potentially use this flaw to crash the
patch utility by tricking it into processing crafted patches.
- CVE-2018-1000156 (arbitrary command execution)
An arbitrary command execution vulnerability has been found in patch
versions prior to 2.7.7 when applying ed-style patches. Due to
insufficient sanitization of the input patch stream, it is possible for
a patch file to cause patch to pass certain ed scripts to the ed
editor, which would run commands. This issue could be exploited to
execute arbitrary commands as the user invoking patch against a
specially crafted patch file, which could be leveraged to obtain
elevated privileges.
Resolution
Upgrade to 2.7.6-7.
# pacman -Syu "patch>=2.7.6-7"
The problems have been fixed upstream but no release is available yet.
References
https://bugs.archlinux.org/task/57526 https://savannah.gnu.org/bugs/?53133 https://git.savannah.gnu.org/cgit/patch.git/commit/?id=9c986353e420ead6e706262bf204d6e03322c300 https://savannah.gnu.org/bugs/?53566 https://git.savannah.gnu.org/cgit/patch.git/commit/?id=123eaff0d5d1aebe128295959435b9ca5909c26d https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 https://security.archlinux.org/CVE-2018-6952 https://security.archlinux.org/CVE-2018-1000156
Workaround
None.