Your submission was sent successfully! Close

CVE-2015-1395

Published: 28 January 2015

Directory traversal vulnerability in GNU patch versions which support Git-style patching before 2.7.3 allows remote attackers to write to arbitrary files with the permissions of the target user via a .. (dot dot) in a diff file name.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
patch
Launchpad, Ubuntu, Debian
Upstream
Released (2.7.3-1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (2.7.1-4ubuntu2.3)
Patches:
Upstream: http://git.savannah.gnu.org/cgit/patch.git/commit/?id=17953b5893f7c9835f0dd2a704ba04e0371d2cbd