CVE-2016-10713

An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:patch:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:44

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/103063 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/103063 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2019:2033 - () https://access.redhat.com/errata/RHSA-2019:2033 -
References () https://git.savannah.gnu.org/cgit/patch.git/commit/src/pch.c?id=a0d7fe4589651c64bd16ddaaa634030bb0455866 - Patch, Vendor Advisory () https://git.savannah.gnu.org/cgit/patch.git/commit/src/pch.c?id=a0d7fe4589651c64bd16ddaaa634030bb0455866 - Patch, Vendor Advisory
References () https://usn.ubuntu.com/3624-1/ - () https://usn.ubuntu.com/3624-1/ -
References () https://usn.ubuntu.com/3624-2/ - () https://usn.ubuntu.com/3624-2/ -

Information

Published : 2018-02-13 19:29

Updated : 2024-11-21 02:44


NVD link : CVE-2016-10713

Mitre link : CVE-2016-10713

CVE.ORG link : CVE-2016-10713


JSON object : View

Products Affected

gnu

  • patch
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer