Описание
Security update for patch
This update for patch fixes the following issues:
Security issues fixed:
- CVE-2018-1000156: Malicious patch files cause ed to execute arbitrary commands (bsc#1088420).
- CVE-2018-6951: Fixed NULL pointer dereference in the intuit_diff_type function in pch.c (bsc#1080918).
- CVE-2016-10713: Fixed out-of-bounds access within pch_write_line() in pch.c (bsc#1080918).
This update was imported from the SUSE:SLE-12:Update update project.
Список пакетов
openSUSE Leap 42.3
Ссылки
- E-Mail link for openSUSE-SU-2018:1137-1
- SUSE Security Ratings
Описание
An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.
Затронутые продукты
Ссылки
- CVE-2016-10713
- SUSE Bug 1080918
- SUSE Bug 1101128
Описание
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
Затронутые продукты
Ссылки
- CVE-2018-1000156
- SUSE Bug 1088420
- SUSE Bug 1093615
- SUSE Bug 1101128
- SUSE Bug 1142513
Описание
An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue.
Затронутые продукты
Ссылки
- CVE-2018-6951
- SUSE Bug 1080951