Описание
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | patch | Will not fix | ||
Red Hat Enterprise Linux 8 | patch | Not affected | ||
Red Hat Enterprise Linux 6 | patch | Fixed | RHSA-2018:1199 | 23.04.2018 |
Red Hat Enterprise Linux 6.4 Advanced Update Support | patch | Fixed | RHSA-2018:2097 | 27.06.2018 |
Red Hat Enterprise Linux 6.5 Advanced Update Support | patch | Fixed | RHSA-2018:2096 | 27.06.2018 |
Red Hat Enterprise Linux 6.6 Advanced Update Support | patch | Fixed | RHSA-2018:2095 | 27.06.2018 |
Red Hat Enterprise Linux 6.6 Telco Extended Update Support | patch | Fixed | RHSA-2018:2095 | 27.06.2018 |
Red Hat Enterprise Linux 6.7 Extended Update Support | patch | Fixed | RHSA-2018:2094 | 27.06.2018 |
Red Hat Enterprise Linux 7 | patch | Fixed | RHSA-2018:1200 | 23.04.2018 |
Red Hat Enterprise Linux 7.2 Advanced Update Support | patch | Fixed | RHSA-2018:2093 | 27.06.2018 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.8 High
CVSS3
Связанные уязвимости
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
GNU Patch version 2.7.6 contains an input validation vulnerability whe ...
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
EPSS
7.8 High
CVSS3