First published: Tue Jan 20 2015(Updated: )
Directory traversal vulnerability in GNU patch versions which support Git-style patching before 2.7.3 allows remote attackers to write to arbitrary files with the permissions of the target user via a .. (dot dot) in a diff file name.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/patch | <=2.7.1-1<=2.7.1-6<=2.7.1-7 | |
redhat/patch | <2.7.3 | 2.7.3 |
Fedora | =20 | |
Fedora | =21 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =14.10 | |
GNU Patch | <=2.7.2 |
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=17953b5893f7c9835f0dd2a704ba04e0371d2cbd
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1395 is considered a high severity vulnerability due to its impact on file system integrity.
To fix CVE-2015-1395, upgrade GNU patch to version 2.7.3 or higher.
The affected software versions for CVE-2015-1395 include GNU patch versions before 2.7.3.
Yes, CVE-2015-1395 can be exploited remotely if a user processes a malicious diff file.
Environments using vulnerable versions of GNU patch, such as Debian, Red Hat, Ubuntu, and Fedora, are susceptible to CVE-2015-1395.