Gnu

Patch

13 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.27%
  • Published 22.12.2021 18:15:08
  • Last modified 21.11.2024 06:32:02

An Invalid Pointer vulnerability exists in GNU patch 2.7 via the another_hunk function, which causes a Denial of Service.

Exploit
  • EPSS 0.12%
  • Published 25.03.2020 17:15:14
  • Last modified 21.11.2024 04:38:55

GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952...

  • EPSS 3.66%
  • Published 25.11.2019 16:15:12
  • Last modified 21.11.2024 02:25:20

A Directory Traversal vulnerability exists in the GNU patch before 2.7.4. A remote attacker can write to arbitrary files via a symlink attack in a patch file. NOTE: this issue exists because of an incomplete fix for CVE-2015-1196.

Exploit
  • EPSS 0.44%
  • Published 16.08.2019 04:15:09
  • Last modified 21.11.2024 04:02:35

do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.

  • EPSS 2.48%
  • Published 26.07.2019 13:15:12
  • Last modified 21.11.2024 04:25:25

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable sy...

  • EPSS 4.41%
  • Published 17.07.2019 21:15:11
  • Last modified 21.11.2024 04:25:24

In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.

  • EPSS 35.17%
  • Published 06.04.2018 13:29:00
  • Last modified 14.04.2025 20:15:16

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via th...

  • EPSS 0.37%
  • Published 13.02.2018 19:29:00
  • Last modified 21.11.2024 02:44:34

An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.

  • EPSS 13.1%
  • Published 13.02.2018 19:29:00
  • Last modified 21.11.2024 04:11:28

An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue.

  • EPSS 11.05%
  • Published 13.02.2018 19:29:00
  • Last modified 21.11.2024 04:11:28

A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.