First published: Tue Jan 20 2015(Updated: )
Directory traversal vulnerability in GNU patch versions which support Git-style patching before 2.7.3 allows remote attackers to write to arbitrary files with the permissions of the target user via a .. (dot dot) in a diff file name.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/patch | <2.7.3 | 2.7.3 |
Fedoraproject Fedora | =20 | |
Fedoraproject Fedora | =21 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =14.10 | |
GNU patch | <=2.7.2 |
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=17953b5893f7c9835f0dd2a704ba04e0371d2cbd
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.