GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1348-1 | patch security update |
Debian DSA |
DSA-4489-1 | patch security update |
Ubuntu USN |
USN-3624-1 | Patch vulnerabilities |
Ubuntu USN |
USN-3624-2 | Patch vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 14 Apr 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-14T19:36:21.263Z
Reserved: 2018-04-06T00:00:00.000Z
Link: CVE-2018-1000156
No data.
Status : Modified
Published: 2018-04-06T13:29:00.377
Modified: 2025-04-14T20:15:16.763
Link: CVE-2018-1000156
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN