First published: Wed Feb 14 2018(Updated: )
GNU patch through version 2.7.6 is vulnerable to a double freeing of memory when supplied a crafted patch file leading to a crash. Upstream Issue: <a href="https://savannah.gnu.org/bugs/index.php?53133">https://savannah.gnu.org/bugs/index.php?53133</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Patch | <=2.7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1545053 is categorized as a potentially high-severity vulnerability due to the risk of crashing the application.
To fix REDHAT-BUG-1545053, upgrade GNU patch to version 2.7.7 or later.
GNU patch versions up to and including 2.7.6 are affected by REDHAT-BUG-1545053.
REDHAT-BUG-1545053 is a memory management vulnerability that involves double freeing memory.
Exploitation of REDHAT-BUG-1545053 could lead to a crash of the GNU patch application.