CVE-2016-10713

Priority
Description
An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access
within pch_write_line() in pch.c can possibly lead to DoS via a crafted
input file.
Notes
Package
Source: patch (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):released (2.6.1-3ubuntu0.2)
Ubuntu 14.04 ESM (Trusty Tahr):released (2.7.1-4ubuntu2.4)
Ubuntu 16.04 LTS (Xenial Xerus):released (2.7.5-1ubuntu0.16.04.1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.7.6-1)
Patches:
Upstream:https://git.savannah.gnu.org/cgit/patch.git/commit/src/pch.c?id=a0d7fe4589651c64bd16ddaaa634030bb0455866
More Information

Updated: 2020-01-29 19:54:21 UTC (commit 768ceb2fdee6790d707d0f681e1b54916744af1e)