Patch GNU Patch

Do you want an email whenever new security vulnerabilities are reported in GNU Patch?

By the Year

In 2024 there have been 0 vulnerabilities in GNU Patch . Patch did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 1 5.50
2020 1 5.50
2019 3 7.17
2018 3 7.60

It may take a day or so for new Patch vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent GNU Patch Security Vulnerabilities

An Invalid Pointer vulnerability exists in GNU patch 2.7

CVE-2021-45261 5.5 - Medium - December 22, 2021

An Invalid Pointer vulnerability exists in GNU patch 2.7 via the another_hunk function, which causes a Denial of Service.

Release of Invalid Pointer or Reference

GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c

CVE-2019-20633 5.5 - Medium - March 25, 2020

GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952.

Double-free

do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character

CVE-2018-20969 7.8 - High - August 16, 2019

do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.

Shell injection

GNU patch through 2.7.6 is vulnerable to OS shell command injection

CVE-2019-13638 7.8 - High - July 26, 2019

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

Shell injection

In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files

CVE-2019-13636 5.9 - Medium - July 17, 2019

In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.

insecure temporary file

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed)

CVE-2018-1000156 7.8 - High - April 06, 2018

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.

Improper Input Validation

An issue was discovered in GNU patch through 2.7.6

CVE-2018-6951 7.5 - High - February 13, 2018

An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue.

NULL Pointer Dereference

A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.

CVE-2018-6952 7.5 - High - February 13, 2018

A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.

Double-free

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for GNU Patch or by GNU? Click the Watch button to subscribe.

GNU
Vendor

GNU Patch
Product

subscribe