Description
Directory traversal vulnerability in GNU patch versions which support Git-style patching before 2.7.3 allows remote attackers to write to arbitrary files with the permissions of the target user via a .. (dot dot) in a diff file name.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2015-1532 | Directory traversal vulnerability in GNU patch versions which support Git-style patching before 2.7.3 allows remote attackers to write to arbitrary files with the permissions of the target user via a .. (dot dot) in a diff file name. |
Ubuntu USN |
USN-2651-1 | GNU patch vulnerabilities |
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-06T04:40:18.688Z
Reserved: 2015-01-27T00:00:00.000Z
Link: CVE-2015-1395
No data.
Status : Modified
Published: 2017-08-25T18:29:00.590
Modified: 2026-05-13T00:24:29.033
Link: CVE-2015-1395
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN