You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa patch

Sigurnosni nedostaci programskog paketa patch

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for patch
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:1137-1
Rating: important
References: #1080918 #1080951 #1088420
Cross-References: CVE-2016-10713 CVE-2018-1000156 CVE-2018-6951

Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for patch fixes the following issues:

Security issues fixed:

– CVE-2018-1000156: Malicious patch files cause ed to execute arbitrary
commands (bsc#1088420).
– CVE-2018-6951: Fixed NULL pointer dereference in the intuit_diff_type
function in pch.c (bsc#1080918).
– CVE-2016-10713: Fixed out-of-bounds access within pch_write_line() in
pch.c (bsc#1080918).

This update was imported from the SUSE:SLE-12:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-416=1

Package List:

– openSUSE Leap 42.3 (i586 x86_64):

patch-2.7.5-9.3.1
patch-debuginfo-2.7.5-9.3.1
patch-debugsource-2.7.5-9.3.1

References:

https://www.suse.com/security/cve/CVE-2016-10713.html
https://www.suse.com/security/cve/CVE-2018-1000156.html
https://www.suse.com/security/cve/CVE-2018-6951.html
https://bugzilla.suse.com/1080918
https://bugzilla.suse.com/1080951
https://bugzilla.suse.com/1088420


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorVlatka Misic
Cert idNCERT-REF-2018-05-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Ranjivost u Cisco WebEx platformi

Otkrivena je ranjivost u Cisco WebEx Network Recording Player platformi za ARF datoteke. Ranjivost je posljedica neispravne verifikacije Cisco WebEx...

Close