GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html - | |
References | () http://rachelbythebay.com/w/2018/04/05/bangpatch/ - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1199 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1200 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2091 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2092 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2093 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2094 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2095 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2096 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2097 - Third Party Advisory | |
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667#19 - Issue Tracking, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/04/msg00013.html - Mailing List, Third Party Advisory | |
References | () https://savannah.gnu.org/bugs/index.php?53566 - Vendor Advisory | |
References | () https://seclists.org/bugtraq/2019/Aug/29 - | |
References | () https://seclists.org/bugtraq/2019/Jul/54 - | |
References | () https://security.gentoo.org/glsa/201904-17 - Third Party Advisory | |
References | () https://twitter.com/kurtseifried/status/982028968877436928 - Third Party Advisory | |
References | () https://usn.ubuntu.com/3624-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3624-2/ - Third Party Advisory |
Information
Published : 2018-04-06 13:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000156
Mitre link : CVE-2018-1000156
CVE.ORG link : CVE-2018-1000156
JSON object : View
Products Affected
redhat
- enterprise_linux_server_aus
- enterprise_linux_server_tus
- enterprise_linux_workstation
- enterprise_linux_server_eus
- enterprise_linux_desktop
- enterprise_linux_server
debian
- debian_linux
gnu
- patch
canonical
- ubuntu_linux
CWE
CWE-20
Improper Input Validation