First published: Tue Feb 13 2018(Updated: )
An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/patch | <=2.7.6-7 | |
GNU Patch | <=2.7.6 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =17.10 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 |
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6951 has a severity rating that indicates it can cause a denial of service due to a segmentation fault.
To fix CVE-2018-6951, upgrade GNU patch to version 2.7.7 or later.
The impact of CVE-2018-6951 is a denial of service caused by a NULL pointer dereference.
GNU patch versions up to and including 2.7.6 are affected by CVE-2018-6951.
Yes, CVE-2018-6951 is present in specific versions of Ubuntu Linux that use the vulnerable GNU patch.