EulerOS Virtualization 2.5.1 : patch (EulerOS-SA-2018-1378)

Medium Nessus Plugin ID 119069


The remote EulerOS Virtualization host is missing a security update.


According to the version of the patch package installed, the EulerOS
Virtualization installation on the remote host is affected by the
following vulnerability :

- GNU Patch version 2.7.6 contains an input validation
vulnerability when processing patch files, specifically
the EDITOR_PROGRAM invocation (using ed) can result in
code execution. This attack appear to be exploitable
via a patch file processed via the patch utility. This
is similar to FreeBSD's CVE-2015-1418 however although
they share a common ancestry the code bases have
diverged over time.(CVE-2018-1000156)

Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.


Update the affected patch package.

See Also

Plugin Details

Severity: Medium

ID: 119069

File Name: EulerOS_SA-2018-1378.nasl

Version: 1.1

Type: local

Published: 2018/11/21

Modified: 2018/11/21

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3.0

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:patch, cpe:/o:huawei:euleros:uvp:2.5.1

Patch Publication Date: 2018/11/15

Reference Information

CVE: CVE-2018-1000156