ALT-PU-2018-1872-1
Closed vulnerabilities
BDU:2018-01502
Уязвимость программной Unix-утилиты GNU Patch, связанная с недостаточной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании, получить доступ к конфиденциальным данным или нарушить их целостность
BDU:2020-01794
Уязвимость утилиты для применения изменений между разными версиями текстовых файлов GNU patch (inp.c и util.c), связанная с неправильным определением ссылки перед доступом к файлу, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2023-01649
Уязвимость функции another_hunk() компонента pch.c программы переноса правок Patch, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01652
Уязвимость функции intuit_diff_type() компонента pch.c программы переноса правок Patch, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-10713
An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.
- http://www.securityfocus.com/bid/103063
- https://access.redhat.com/errata/RHSA-2019:2033
- https://git.savannah.gnu.org/cgit/patch.git/commit/src/pch.c?id=a0d7fe4589651c64bd16ddaaa634030bb0455866
- https://usn.ubuntu.com/3624-1/
- https://usn.ubuntu.com/3624-2/
- http://www.securityfocus.com/bid/103063
- https://access.redhat.com/errata/RHSA-2019:2033
- https://git.savannah.gnu.org/cgit/patch.git/commit/src/pch.c?id=a0d7fe4589651c64bd16ddaaa634030bb0455866
- https://usn.ubuntu.com/3624-1/
- https://usn.ubuntu.com/3624-2/
Modified: 2025-04-14
CVE-2018-1000156
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
- http://rachelbythebay.com/w/2018/04/05/bangpatch/
- https://access.redhat.com/errata/RHSA-2018:1199
- https://access.redhat.com/errata/RHSA-2018:1200
- https://access.redhat.com/errata/RHSA-2018:2091
- https://access.redhat.com/errata/RHSA-2018:2092
- https://access.redhat.com/errata/RHSA-2018:2093
- https://access.redhat.com/errata/RHSA-2018:2094
- https://access.redhat.com/errata/RHSA-2018:2095
- https://access.redhat.com/errata/RHSA-2018:2096
- https://access.redhat.com/errata/RHSA-2018:2097
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667#19
- https://lists.debian.org/debian-lts-announce/2018/04/msg00013.html
- https://savannah.gnu.org/bugs/index.php?53566
- https://seclists.org/bugtraq/2019/Aug/29
- https://seclists.org/bugtraq/2019/Jul/54
- https://security.gentoo.org/glsa/201904-17
- https://usn.ubuntu.com/3624-1/
- https://usn.ubuntu.com/3624-2/
- https://web.archive.org/web/20180405231329/https://twitter.com/kurtseifried/status/982028968877436928
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
- http://rachelbythebay.com/w/2018/04/05/bangpatch/
- https://access.redhat.com/errata/RHSA-2018:1199
- https://access.redhat.com/errata/RHSA-2018:1200
- https://access.redhat.com/errata/RHSA-2018:2091
- https://access.redhat.com/errata/RHSA-2018:2092
- https://access.redhat.com/errata/RHSA-2018:2093
- https://access.redhat.com/errata/RHSA-2018:2094
- https://access.redhat.com/errata/RHSA-2018:2095
- https://access.redhat.com/errata/RHSA-2018:2096
- https://access.redhat.com/errata/RHSA-2018:2097
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667#19
- https://lists.debian.org/debian-lts-announce/2018/04/msg00013.html
- https://savannah.gnu.org/bugs/index.php?53566
- https://seclists.org/bugtraq/2019/Aug/29
- https://seclists.org/bugtraq/2019/Jul/54
- https://security.gentoo.org/glsa/201904-17
- https://twitter.com/kurtseifried/status/982028968877436928
- https://usn.ubuntu.com/3624-1/
- https://usn.ubuntu.com/3624-2/
Modified: 2024-11-21
CVE-2018-20969
do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
- https://access.redhat.com/errata/RHSA-2019:2798
- https://access.redhat.com/errata/RHSA-2019:2964
- https://access.redhat.com/errata/RHSA-2019:3757
- https://access.redhat.com/errata/RHSA-2019:3758
- https://access.redhat.com/errata/RHSA-2019:4061
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
- https://github.com/irsl/gnu-patch-vulnerabilities
- https://seclists.org/bugtraq/2019/Aug/29
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
- https://access.redhat.com/errata/RHSA-2019:2798
- https://access.redhat.com/errata/RHSA-2019:2964
- https://access.redhat.com/errata/RHSA-2019:3757
- https://access.redhat.com/errata/RHSA-2019:3758
- https://access.redhat.com/errata/RHSA-2019:4061
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
- https://github.com/irsl/gnu-patch-vulnerabilities
- https://seclists.org/bugtraq/2019/Aug/29
Modified: 2024-11-21
CVE-2018-6951
An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue.
- http://www.securityfocus.com/bid/103044
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a
- https://savannah.gnu.org/bugs/index.php?53132
- https://security.gentoo.org/glsa/201904-17
- https://usn.ubuntu.com/3624-1/
- http://www.securityfocus.com/bid/103044
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a
- https://savannah.gnu.org/bugs/index.php?53132
- https://security.gentoo.org/glsa/201904-17
- https://usn.ubuntu.com/3624-1/
Modified: 2024-11-21
CVE-2018-6952
A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.
- http://www.securityfocus.com/bid/103047
- https://access.redhat.com/errata/RHSA-2019:2033
- https://savannah.gnu.org/bugs/index.php?53133
- https://security.gentoo.org/glsa/201904-17
- http://www.securityfocus.com/bid/103047
- https://access.redhat.com/errata/RHSA-2019:2033
- https://savannah.gnu.org/bugs/index.php?53133
- https://security.gentoo.org/glsa/201904-17
Modified: 2024-11-21
CVE-2019-13636
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
- https://github.com/irsl/gnu-patch-vulnerabilities
- https://lists.debian.org/debian-lts-announce/2019/07/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/
- https://seclists.org/bugtraq/2019/Aug/29
- https://seclists.org/bugtraq/2019/Jul/54
- https://security.gentoo.org/glsa/201908-22
- https://security.netapp.com/advisory/ntap-20190828-0001/
- https://usn.ubuntu.com/4071-1/
- https://usn.ubuntu.com/4071-2/
- https://www.debian.org/security/2019/dsa-4489
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
- https://github.com/irsl/gnu-patch-vulnerabilities
- https://lists.debian.org/debian-lts-announce/2019/07/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/
- https://seclists.org/bugtraq/2019/Aug/29
- https://seclists.org/bugtraq/2019/Jul/54
- https://security.gentoo.org/glsa/201908-22
- https://security.netapp.com/advisory/ntap-20190828-0001/
- https://usn.ubuntu.com/4071-1/
- https://usn.ubuntu.com/4071-2/
- https://www.debian.org/security/2019/dsa-4489
Modified: 2024-11-21
CVE-2019-20633
GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952.
