Your submission was sent successfully! Close

CVE-2015-1395

Published: 28 January 2015

Directory traversal vulnerability in GNU patch versions which support Git-style patching before 2.7.3 allows remote attackers to write to arbitrary files with the permissions of the target user via a .. (dot dot) in a diff file name.

Notes

AuthorNote
tyhicks
git-style patch support added in 2.7
Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
patch
Launchpad, Ubuntu, Debian
lucid Not vulnerable
(2.6-2ubuntu1)
precise Not vulnerable
(2.6.1-3)
trusty
Released (2.7.1-4ubuntu2.3)
upstream
Released (2.7.3-1)
utopic
Released (2.7.1-5ubuntu0.3)
vivid
Released (2.7.3-1)
Patches:
upstream: http://git.savannah.gnu.org/cgit/patch.git/commit/?id=17953b5893f7c9835f0dd2a704ba04e0371d2cbd