Описание
Security update for patch
This update for patch fixes several issues.
These security issues were fixed:
- CVE-2018-1000156: patch: Malicious patch files cause ed to execute arbitrary commands (bsc#1088420).
- CVE-2014-9637: Prevent DoS by remote attackers (memory consumption and segmentation fault) via a crafted diff file (bsc#914891).
- CVE-2016-10713: Prevent out-of-bounds access within pch_write_line() that could have lead to DoS via a crafted input file (bsc#1080918).
- CVE-2010-4651: Fixed a directory traversal bug (bsc#662957):
Список пакетов
SUSE Linux Enterprise Point of Sale 11 SP3
SUSE Linux Enterprise Server 11 SP3-LTSS
SUSE Linux Enterprise Server 11 SP3-TERADATA
SUSE Linux Enterprise Server 11 SP4
SUSE Linux Enterprise Server for SAP Applications 11 SP4
Ссылки
- Link for SUSE-SU-2018:1162-1
- E-Mail link for SUSE-SU-2018:1162-1
- SUSE Security Ratings
- SUSE Bug 1059698
- SUSE Bug 1080918
- SUSE Bug 1088420
- SUSE Bug 662957
- SUSE Bug 914891
- SUSE CVE CVE-2010-4651 page
- SUSE CVE CVE-2014-9637 page
- SUSE CVE CVE-2016-10713 page
- SUSE CVE CVE-2018-1000156 page
Описание
Directory traversal vulnerability in util.c in GNU patch 2.6.1 and earlier allows user-assisted remote attackers to create or overwrite arbitrary files via a filename that is specified with a .. (dot dot) or full pathname, a related issue to CVE-2010-1679.
Затронутые продукты
Ссылки
- CVE-2010-4651
- SUSE Bug 1093615
- SUSE Bug 1101128
- SUSE Bug 662957
Описание
GNU patch 2.7.2 and earlier allows remote attackers to cause a denial of service (memory consumption and segmentation fault) via a crafted diff file.
Затронутые продукты
Ссылки
- CVE-2014-9637
- SUSE Bug 1059698
- SUSE Bug 1101128
- SUSE Bug 914891
Описание
An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.
Затронутые продукты
Ссылки
- CVE-2016-10713
- SUSE Bug 1080918
- SUSE Bug 1101128
Описание
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
Затронутые продукты
Ссылки
- CVE-2018-1000156
- SUSE Bug 1088420
- SUSE Bug 1093615
- SUSE Bug 1101128
- SUSE Bug 1142513