Описание
Security update for patch
This update for patch fixes the following issues:
Security issues fixed:
- CVE-2018-1000156: Malicious patch files cause ed to execute arbitrary commands (bsc#1088420).
- CVE-2018-6951: Fixed NULL pointer dereference in the intuit_diff_type function in pch.c (bsc#1080918).
- CVE-2016-10713: Fixed out-of-bounds access within pch_write_line() in pch.c (bsc#1080918).
Список пакетов
SUSE Linux Enterprise Desktop 12 SP3
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server for SAP Applications 12 SP3
Ссылки
- Link for SUSE-SU-2018:1128-1
- E-Mail link for SUSE-SU-2018:1128-1
- SUSE Security Ratings
- SUSE Bug 1080918
- SUSE Bug 1080951
- SUSE Bug 1088420
- SUSE CVE CVE-2016-10713 page
- SUSE CVE CVE-2018-1000156 page
- SUSE CVE CVE-2018-6951 page
Описание
An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.
Затронутые продукты
Ссылки
- CVE-2016-10713
- SUSE Bug 1080918
- SUSE Bug 1101128
Описание
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
Затронутые продукты
Ссылки
- CVE-2018-1000156
- SUSE Bug 1088420
- SUSE Bug 1093615
- SUSE Bug 1101128
- SUSE Bug 1142513
Описание
An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue.
Затронутые продукты
Ссылки
- CVE-2018-6951
- SUSE Bug 1080951