Lucene search

K
GnuPatch

13 matches found

CVE
CVE
added 2019/07/26 1:15 p.m.809 views

CVE-2019-13638

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

9.3CVSS7.8AI score0.43395EPSS
CVE
CVE
added 2019/08/16 4:15 a.m.699 views

CVE-2018-20969

do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.

9.3CVSS7.4AI score0.03446EPSS
CVE
CVE
added 2018/02/13 7:29 p.m.575 views

CVE-2018-6952

A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.

7.5CVSS6.2AI score0.12995EPSS
CVE
CVE
added 2019/07/17 9:15 p.m.543 views

CVE-2019-13636

In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.

5.9CVSS6.3AI score0.04739EPSS
CVE
CVE
added 2018/04/06 1:29 p.m.529 views

CVE-2018-1000156

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE...

7.8CVSS7.8AI score0.43395EPSS
CVE
CVE
added 2020/03/25 5:15 p.m.415 views

CVE-2019-20633

GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952.

5.5CVSS6.2AI score0.12995EPSS
CVE
CVE
added 2018/02/13 7:29 p.m.413 views

CVE-2018-6951

An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue.

7.5CVSS7.1AI score0.23554EPSS
CVE
CVE
added 2018/02/13 7:29 p.m.234 views

CVE-2016-10713

An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.

5.5CVSS5.9AI score0.00477EPSS
CVE
CVE
added 2015/01/21 6:59 p.m.69 views

CVE-2015-1196

GNU patch 2.7.1 allows remote attackers to write to arbitrary files via a symlink attack in a patch file.

4.3CVSS6AI score0.00853EPSS
CVE
CVE
added 2017/08/25 6:29 p.m.67 views

CVE-2014-9637

GNU patch 2.7.2 and earlier allows remote attackers to cause a denial of service (memory consumption and segmentation fault) via a crafted diff file.

7.1CVSS5.7AI score0.00378EPSS
CVE
CVE
added 2017/08/25 6:29 p.m.66 views

CVE-2015-1395

Directory traversal vulnerability in GNU patch versions which support Git-style patching before 2.7.3 allows remote attackers to write to arbitrary files with the permissions of the target user via a .. (dot dot) in a diff file name.

7.8CVSS7.2AI score0.01515EPSS
CVE
CVE
added 2021/12/22 6:15 p.m.64 views

CVE-2021-45261

An Invalid Pointer vulnerability exists in GNU patch 2.7 via the another_hunk function, which causes a Denial of Service.

5.5CVSS5.3AI score0.00387EPSS
CVE
CVE
added 2019/11/25 4:15 p.m.53 views

CVE-2015-1396

A Directory Traversal vulnerability exists in the GNU patch before 2.7.4. A remote attacker can write to arbitrary files via a symlink attack in a patch file. NOTE: this issue exists because of an incomplete fix for CVE-2015-1196.

7.5CVSS6.2AI score0.03663EPSS