patch is vulnerable to denial of service. An out-of-bounds access in the function pch_write_line
in pch.c
allows an attacker to crash the application using a malicious file.
www.securityfocus.com/bid/103063
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index
access.redhat.com/errata/RHSA-2019:2033
access.redhat.com/security/updates/classification/#low
bugzilla.redhat.com/show_bug.cgi?id=1626473
bugzilla.redhat.com/show_bug.cgi?id=1653294
git.savannah.gnu.org/cgit/patch.git/commit/src/pch.c?id=a0d7fe4589651c64bd16ddaaa634030bb0455866
usn.ubuntu.com/3624-1/
usn.ubuntu.com/3624-2/