First published: Wed Feb 14 2018(Updated: )
A flaw was found in GNU patch before 2.7.6. An Out-of-bounds access within pch_write_line() function in pch.c file which can lead to a Denial of Service via a crafted input file. External References: <a href="https://savannah.gnu.org/bugs/index.php?45990">https://savannah.gnu.org/bugs/index.php?45990</a> Upstream Patch: <a href="https://git.savannah.gnu.org/cgit/patch.git/commit/src/pch.c?id=a0d7fe4589651c6">https://git.savannah.gnu.org/cgit/patch.git/commit/src/pch.c?id=a0d7fe4589651c6</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Patch | <2.7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1545405 is high due to the potential for Denial of Service exploitation.
To fix REDHAT-BUG-1545405, update GNU patch to version 2.7.6 or later.
GNU patch versions prior to 2.7.6 are affected by REDHAT-BUG-1545405.
REDHAT-BUG-1545405 is classified as an out-of-bounds access vulnerability.
As of now, there are no known active exploits for REDHAT-BUG-1545405.