GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
{
"license": "CC-BY-4.0",
"sources": [
{
"published": "2018-04-06T13:29:00.377Z",
"id": "CVE-2018-1000156",
"modified": "2025-04-14T20:15:16.763Z",
"imported": "2026-03-31T16:10:31.538Z",
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000156",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2018-1000156"
}
]
}