GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2018-04-06 13:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-1000156
Mitre link : CVE-2018-1000156
CVE.ORG link : CVE-2018-1000156
JSON object : View
Products Affected
debian
- debian_linux
gnu
- patch
redhat
- enterprise_linux_server_tus
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_server_eus
- enterprise_linux_server
- enterprise_linux_desktop
canonical
- ubuntu_linux
CWE
CWE-20
Improper Input Validation