CVE-2021-45261
- EPSS 0.27%
- Published 22.12.2021 18:15:08
- Last modified 21.11.2024 06:32:02
An Invalid Pointer vulnerability exists in GNU patch 2.7 via the another_hunk function, which causes a Denial of Service.
CVE-2019-20633
- EPSS 0.12%
- Published 25.03.2020 17:15:14
- Last modified 21.11.2024 04:38:55
GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952...
CVE-2015-1396
- EPSS 3.66%
- Published 25.11.2019 16:15:12
- Last modified 21.11.2024 02:25:20
A Directory Traversal vulnerability exists in the GNU patch before 2.7.4. A remote attacker can write to arbitrary files via a symlink attack in a patch file. NOTE: this issue exists because of an incomplete fix for CVE-2015-1196.
CVE-2018-20969
- EPSS 0.44%
- Published 16.08.2019 04:15:09
- Last modified 21.11.2024 04:02:35
do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.
CVE-2019-13638
- EPSS 2.48%
- Published 26.07.2019 13:15:12
- Last modified 21.11.2024 04:25:25
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable sy...
CVE-2019-13636
- EPSS 4.41%
- Published 17.07.2019 21:15:11
- Last modified 21.11.2024 04:25:24
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
CVE-2018-1000156
- EPSS 35.17%
- Published 06.04.2018 13:29:00
- Last modified 14.04.2025 20:15:16
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via th...
CVE-2016-10713
- EPSS 0.37%
- Published 13.02.2018 19:29:00
- Last modified 21.11.2024 02:44:34
An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.
CVE-2018-6951
- EPSS 13.1%
- Published 13.02.2018 19:29:00
- Last modified 21.11.2024 04:11:28
An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue.
CVE-2018-6952
- EPSS 11.05%
- Published 13.02.2018 19:29:00
- Last modified 21.11.2024 04:11:28
A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.