[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

GNU patch utility - (bulletinapr2018)

ID: oval:org.secpod.oval:def:2101808Date: (C)2019-12-31   (M)2022-10-10
Class: PATCHFamily: unix




GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD"s CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.

Platform:
Sun Solaris 11
Product:
text/gnu-patch
Reference:
bulletinapr2018
CVE-2018-1000156
CVE    1
CVE-2018-1000156
CPE    1
cpe:/o:oracle:solaris:11

© SecPod Technologies