First published: Fri Jan 23 2015(Updated: )
It was reported [1] that a crafted diff file (attached) can make patch to eat memory and later segfault. Upstream commit that fixes this: <a href="http://git.savannah.gnu.org/cgit/patch.git/commit/?id=0c08d7a902c6fdd49b704623a12d8d672ef18944">http://git.savannah.gnu.org/cgit/patch.git/commit/?id=0c08d7a902c6fdd49b704623a12d8d672ef18944</a> [1]: <a href="https://savannah.gnu.org/bugs/?44051">https://savannah.gnu.org/bugs/?44051</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Patch |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1185262 highlights a memory consumption issue that can lead to a segmentation fault.
To resolve REDHAT-BUG-1185262, update the GNU patch to the version that includes the upstream commit fixing the issue.
Users of the GNU patch tool are affected by the vulnerability described in REDHAT-BUG-1185262.
While REDHAT-BUG-1185262 does not directly indicate data loss, it can cause application crashes that may lead to unintended data loss during operations.
The problem in REDHAT-BUG-1185262 is caused by a crafted diff file that improperly handles memory allocation leading to severe errors.