ALT-PU-2015-1846-1
Closed vulnerabilities
BDU:2017-02046
Уязвимость компонента, поддерживаемого Git-style, программной Unix-утилиты GNU Patch операционных систем Ubuntu, Fedora, позволяющая нарушителю изменять произвольные файлы
BDU:2017-02048
Уязвимость программной Unix-утилиты GNU Patch операционных систем Ubuntu, Fedora и Linux-дистрибутива Mageia, позволяющая нарушителю вызвать отказ в обслуживании при помощи специально созданного diff-файла
Modified: 2025-04-20
CVE-2014-9637
GNU patch 2.7.2 and earlier allows remote attackers to cause a denial of service (memory consumption and segmentation fault) via a crafted diff file.
- http://advisories.mageia.org/MGASA-2015-0068.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154214.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148953.html
- http://www.openwall.com/lists/oss-security/2015/01/22/7
- http://www.securityfocus.com/bid/72286
- http://www.ubuntu.com/usn/USN-2651-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1185262
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=0c08d7a902c6fdd49b704623a12d8d672ef18944
- https://savannah.gnu.org/bugs/?44051
- http://advisories.mageia.org/MGASA-2015-0068.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154214.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148953.html
- http://www.openwall.com/lists/oss-security/2015/01/22/7
- http://www.securityfocus.com/bid/72286
- http://www.ubuntu.com/usn/USN-2651-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1185262
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=0c08d7a902c6fdd49b704623a12d8d672ef18944
- https://savannah.gnu.org/bugs/?44051
Modified: 2025-04-12
CVE-2015-1196
GNU patch 2.7.1 allows remote attackers to write to arbitrary files via a symlink attack in a patch file.
- http://git.savannah.gnu.org/cgit/patch.git/commit/?id=4e9269a5fc1fe80a1095a92593dd85db871e1fd3
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00013.html
- http://seclists.org/oss-sec/2015/q1/173
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securityfocus.com/bid/72074
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775227
- https://bugzilla.redhat.com/show_bug.cgi?id=1182154
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99967
- http://git.savannah.gnu.org/cgit/patch.git/commit/?id=4e9269a5fc1fe80a1095a92593dd85db871e1fd3
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00013.html
- http://seclists.org/oss-sec/2015/q1/173
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securityfocus.com/bid/72074
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775227
- https://bugzilla.redhat.com/show_bug.cgi?id=1182154
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99967
Modified: 2025-04-20
CVE-2015-1395
Directory traversal vulnerability in GNU patch versions which support Git-style patching before 2.7.3 allows remote attackers to write to arbitrary files with the permissions of the target user via a .. (dot dot) in a diff file name.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154214.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148953.html
- http://www.openwall.com/lists/oss-security/2015/01/27/28
- http://www.securityfocus.com/bid/72846
- http://www.ubuntu.com/usn/USN-2651-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775873
- https://bugzilla.redhat.com/show_bug.cgi?id=1184490
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=17953b5893f7c9835f0dd2a704ba04e0371d2cbd
- https://savannah.gnu.org/bugs/?44059
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154214.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148953.html
- http://www.openwall.com/lists/oss-security/2015/01/27/28
- http://www.securityfocus.com/bid/72846
- http://www.ubuntu.com/usn/USN-2651-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775873
- https://bugzilla.redhat.com/show_bug.cgi?id=1184490
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=17953b5893f7c9835f0dd2a704ba04e0371d2cbd
- https://savannah.gnu.org/bugs/?44059
Modified: 2024-11-21
CVE-2015-1396
A Directory Traversal vulnerability exists in the GNU patch before 2.7.4. A remote attacker can write to arbitrary files via a symlink attack in a patch file. NOTE: this issue exists because of an incomplete fix for CVE-2015-1196.
- http://www.openwall.com/lists/oss-security/2015/01/27/29
- http://www.openwall.com/lists/oss-security/2015/01/27/29
- http://www.securityfocus.com/bid/75358
- http://www.securityfocus.com/bid/75358
- http://www.ubuntu.com/usn/USN-2651-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1186764
- http://www.openwall.com/lists/oss-security/2015/01/27/29
- http://www.openwall.com/lists/oss-security/2015/01/27/29
- http://www.securityfocus.com/bid/75358
- http://www.securityfocus.com/bid/75358
- http://www.ubuntu.com/usn/USN-2651-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1186764