CVE-2010-4651
Published: 11 March 2011
Directory traversal vulnerability in util.c in GNU patch 2.6.1 and earlier allows user-assisted remote attackers to create or overwrite arbitrary files via a filename that is specified with a .. (dot dot) or full pathname, a related issue to CVE-2010-1679.
Notes
Author | Note |
---|---|
mdeslaur | patch changes behaviour and likely causes regressions |
Priority
Status
Package | Release | Status |
---|---|---|
patch Launchpad, Ubuntu, Debian |
precise |
Released
(2.6.1-3ubuntu0.1)
|
trusty |
Not vulnerable
(2.7.1-4ubuntu1)
|
|
upstream |
Needs triage
|
|
utopic |
Not vulnerable
(2.7.1-5)
|
|
vivid |
Not vulnerable
(2.7.1-6)
|
|
Patches: upstream: http://git.savannah.gnu.org/cgit/patch.git/commit/?id=685a78b6052f4df6eac6d625a545cfb54a6ac0e1 |