Lucene search

K

Gnu Patch Security Vulnerabilities

cve
cve

CVE-2010-4651

Directory traversal vulnerability in util.c in GNU patch 2.6.1 and earlier allows user-assisted remote attackers to create or overwrite arbitrary files via a filename that is specified with a .. (dot dot) or full pathname, a related issue to CVE-2010-1679.

6.2AI Score

0.02EPSS

2011-03-11 10:55 PM
41
cve
cve

CVE-2014-9637

GNU patch 2.7.2 and earlier allows remote attackers to cause a denial of service (memory consumption and segmentation fault) via a crafted diff file.

5.5CVSS

5.7AI Score

0.01EPSS

2017-08-25 06:29 PM
47
cve
cve

CVE-2015-1196

GNU patch 2.7.1 allows remote attackers to write to arbitrary files via a symlink attack in a patch file.

6AI Score

0.003EPSS

2015-01-21 06:59 PM
47
cve
cve

CVE-2015-1395

Directory traversal vulnerability in GNU patch versions which support Git-style patching before 2.7.3 allows remote attackers to write to arbitrary files with the permissions of the target user via a .. (dot dot) in a diff file name.

7.5CVSS

7.2AI Score

0.003EPSS

2017-08-25 06:29 PM
48
cve
cve

CVE-2015-1396

A Directory Traversal vulnerability exists in the GNU patch before 2.7.4. A remote attacker can write to arbitrary files via a symlink attack in a patch file. NOTE: this issue exists because of an incomplete fix for CVE-2015-1196.

7.5CVSS

6.2AI Score

0.029EPSS

2019-11-25 04:15 PM
41
cve
cve

CVE-2016-10713

An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.

5.5CVSS

5.9AI Score

0.002EPSS

2018-02-13 07:29 PM
202
cve
cve

CVE-2018-1000156

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE...

7.8CVSS

7.8AI Score

0.016EPSS

2018-04-06 01:29 PM
328
cve
cve

CVE-2018-20969

do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.

7.8CVSS

7.4AI Score

0.011EPSS

2019-08-16 04:15 AM
511
cve
cve

CVE-2018-6951

An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue.

7.5CVSS

7.1AI Score

0.013EPSS

2018-02-13 07:29 PM
236
cve
cve

CVE-2018-6952

A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.

7.5CVSS

6.2AI Score

0.035EPSS

2018-02-13 07:29 PM
396
cve
cve

CVE-2019-13636

In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.

5.9CVSS

6.3AI Score

0.021EPSS

2019-07-17 09:15 PM
364
cve
cve

CVE-2019-13638

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

7.8CVSS

7.8AI Score

0.016EPSS

2019-07-26 01:15 PM
631
cve
cve

CVE-2019-20633

GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952.

5.5CVSS

6.2AI Score

0.035EPSS

2020-03-25 05:15 PM
228
2
cve
cve

CVE-2021-45261

An Invalid Pointer vulnerability exists in GNU patch 2.7 via the another_hunk function, which causes a Denial of Service.

5.5CVSS

5.3AI Score

0.001EPSS

2021-12-22 06:15 PM
48