ALT-PU-2018-1872-1
Closed vulnerabilities
BDU:2018-01502
Уязвимость программной Unix-утилиты GNU Patch, связанная с недостаточной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании, получить доступ к конфиденциальным данным или нарушить их целостность
BDU:2020-01794
Уязвимость утилиты для применения изменений между разными версиями текстовых файлов GNU patch (inp.c и util.c), связанная с неправильным определением ссылки перед доступом к файлу, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2023-01649
Уязвимость функции another_hunk() компонента pch.c программы переноса правок Patch, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01652
Уязвимость функции intuit_diff_type() компонента pch.c программы переноса правок Patch, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-10713
An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.
Modified: 2024-11-21
CVE-2018-1000156
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
- http://rachelbythebay.com/w/2018/04/05/bangpatch/
- http://rachelbythebay.com/w/2018/04/05/bangpatch/
- RHSA-2018:1199
- RHSA-2018:1199
- RHSA-2018:1200
- RHSA-2018:1200
- RHSA-2018:2091
- RHSA-2018:2091
- RHSA-2018:2092
- RHSA-2018:2092
- RHSA-2018:2093
- RHSA-2018:2093
- RHSA-2018:2094
- RHSA-2018:2094
- RHSA-2018:2095
- RHSA-2018:2095
- RHSA-2018:2096
- RHSA-2018:2096
- RHSA-2018:2097
- RHSA-2018:2097
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667#19
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667#19
- [debian-lts-announce] 20180416 [SECURITY] [DLA 1348-1] patch security update
- [debian-lts-announce] 20180416 [SECURITY] [DLA 1348-1] patch security update
- https://savannah.gnu.org/bugs/index.php?53566
- https://savannah.gnu.org/bugs/index.php?53566
- 20190816 Details about recent GNU patch vulnerabilities
- 20190816 Details about recent GNU patch vulnerabilities
- 20190730 [SECURITY] [DSA 4489-1] patch security update
- 20190730 [SECURITY] [DSA 4489-1] patch security update
- GLSA-201904-17
- GLSA-201904-17
- https://twitter.com/kurtseifried/status/982028968877436928
- https://twitter.com/kurtseifried/status/982028968877436928
- USN-3624-1
- USN-3624-1
- USN-3624-2
- USN-3624-2
Modified: 2024-11-21
CVE-2018-20969
do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
- RHSA-2019:2798
- RHSA-2019:2798
- RHSA-2019:2964
- RHSA-2019:2964
- RHSA-2019:3757
- RHSA-2019:3757
- RHSA-2019:3758
- RHSA-2019:3758
- RHSA-2019:4061
- RHSA-2019:4061
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
- https://github.com/irsl/gnu-patch-vulnerabilities
- https://github.com/irsl/gnu-patch-vulnerabilities
- 20190816 Details about recent GNU patch vulnerabilities
- 20190816 Details about recent GNU patch vulnerabilities
Modified: 2024-11-21
CVE-2018-6951
An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue.
- 103044
- 103044
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a
- https://savannah.gnu.org/bugs/index.php?53132
- https://savannah.gnu.org/bugs/index.php?53132
- GLSA-201904-17
- GLSA-201904-17
- USN-3624-1
- USN-3624-1
Modified: 2024-11-21
CVE-2018-6952
A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.
Modified: 2024-11-21
CVE-2019-13636
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
- https://github.com/irsl/gnu-patch-vulnerabilities
- https://github.com/irsl/gnu-patch-vulnerabilities
- [debian-lts-announce] 20190719 [SECURITY] [DLA 1856-1] patch security update
- [debian-lts-announce] 20190719 [SECURITY] [DLA 1856-1] patch security update
- FEDORA-2019-ac709da87f
- FEDORA-2019-ac709da87f
- 20190816 Details about recent GNU patch vulnerabilities
- 20190816 Details about recent GNU patch vulnerabilities
- 20190730 [SECURITY] [DSA 4489-1] patch security update
- 20190730 [SECURITY] [DSA 4489-1] patch security update
- GLSA-201908-22
- GLSA-201908-22
- https://security.netapp.com/advisory/ntap-20190828-0001/
- https://security.netapp.com/advisory/ntap-20190828-0001/
- USN-4071-1
- USN-4071-1
- USN-4071-2
- USN-4071-2
- DSA-4489
- DSA-4489
Modified: 2024-11-21
CVE-2019-20633
GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952.