Bug 1545053 (CVE-2018-6952)

Summary: CVE-2018-6952 patch: Double free of memory in pch.c:another_hunk() causes a crash
Product: [Other] Security Response Reporter: Sam Fowler <sfowler>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: apmukher, than, twaugh
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A double-free flaw was found in the way the patch utility processed patch files. An attacker could potentially use this flaw to crash the patch utility by tricking it into processing crafted patches.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-08-06 13:18:36 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1545054, 1554752, 1554758, 1554759    
Bug Blocks: 1545055    

Description Sam Fowler 2018-02-14 07:19:30 UTC
GNU patch through version 2.7.6 is vulnerable to a double freeing of memory when supplied a crafted patch file leading to a crash.

Upstream Issue:

https://savannah.gnu.org/bugs/index.php?53133

Comment 1 Sam Fowler 2018-02-14 07:19:51 UTC
Created patch tracking bugs for this issue:

Affects: fedora-all [bug 1545054]

Comment 7 errata-xmlrpc 2019-08-06 12:04:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2019:2033 https://access.redhat.com/errata/RHSA-2019:2033

Comment 8 Product Security DevOps Team 2019-08-06 13:18:36 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2018-6952