Multiple vulnerabilities have been found in Patch, the worst of which could result in the arbitrary execution of code.
Package | sys-devel/patch on all architectures |
---|---|
Affected versions | < 2.7.6-r4 |
Unaffected versions | >= 2.7.6-r4 |
Patch takes a patch file containing a difference listing produced by the diff program and applies those differences to one or more original files, producing patched versions.
Multiple vulnerabilities have been discovered in Patch. Please review the CVE identifiers referenced below for details.
A local attacker could pass a specially crafted diff file to Patch, possibly resulting in a Denial of Service condition or arbitrary code execution.
There is no known workaround at this time.
All Patch users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-devel/patch-2.7.6-r4"
Release date
August 18, 2019
Latest revision
August 18, 2019: 1
Severity
normal
Exploitable
local
Bugzilla entries