[ASA-201810-8] patch: multiple issues
rgacogne at archlinux.org
Wed Oct 10 08:09:37 UTC 2018
Arch Linux Security Advisory ASA-201810-8
Date : 2018-10-09
CVE-ID : CVE-2018-6951 CVE-2018-6952 CVE-2018-1000156
Package : patch
Type : multiple issues
Remote : No
Link : https://security.archlinux.org/AVG-619
The package patch before version 2.7.6-3 is vulnerable to multiple
issues including arbitrary command execution and denial of service.
Upgrade to 2.7.6-3.
# pacman -Syu "patch>=2.7.6-3"
The problems have been fixed upstream but no release is available yet.
- CVE-2018-6951 (denial of service)
An issue was discovered in GNU patch through 2.7.6. There is a
segmentation fault, associated with a NULL pointer dereference, leading
to a denial of service in the intuit_diff_type function in pch.c, aka a
"mangled rename" issue.
- CVE-2018-6952 (denial of service)
A double free exists in the another_hunk function in pch.c in GNU patch
through 2.7.6. An attacker could potentially use this flaw to crash the
patch utility by tricking it into processing crafted patches.
- CVE-2018-1000156 (arbitrary command execution)
An arbitrary command execution vulnerability has been found in patch
versions prior to 2.7.7 when applying ed-style patches. Due to
insufficient sanitization of the input patch stream, it is possible for
a patch file to cause patch to pass certain ed scripts to the ed
editor, which would run commands. This issue could be exploited to
execute arbitrary commands as the user invoking patch against a
specially crafted patch file, which could be leveraged to obtain
An attacker can execute arbitrary commands or crash the patch utility
via a specially crafted patch file.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: OpenPGP digital signature
More information about the arch-security