Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Patch
(Gnu)Repositories | https://git.savannah.gnu.org/git/patch.git |
#Vulnerabilities | 13 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2017-08-25 | CVE-2015-1395 | Directory traversal vulnerability in GNU patch versions which support Git-style patching before 2.7.3 allows remote attackers to write to arbitrary files with the permissions of the target user via a .. (dot dot) in a diff file name. | Ubuntu_linux, Fedora, Patch | 7.5 | ||
2015-01-21 | CVE-2015-1196 | GNU patch 2.7.1 allows remote attackers to write to arbitrary files via a symlink attack in a patch file. | Patch, Opensuse, Solaris | N/A | ||
2017-08-25 | CVE-2014-9637 | GNU patch 2.7.2 and earlier allows remote attackers to cause a denial of service (memory consumption and segmentation fault) via a crafted diff file. | Ubuntu_linux, Fedora, Patch, Mageia | 5.5 |