5
CVSSv2

CVE-2018-6952

Published: 13/02/2018 Updated: 17/04/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A double free exists in the another_hunk function in pch.c in GNU patch up to and including 2.7.6.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu patch

Vendor Advisories

Synopsis Low: patch security and bug fix update Type/Severity Security Advisory: Low Topic An update for patch is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) base score, which giv ...
do_ed_script in pchc in GNU patch through 276 does not block strings beginning with a ! character NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter(CVE-2018-20969) GNU patch through 276 is vulnerable to OS shell command injection that can be exploited by opening ...
do_ed_script in pchc in GNU patch through 276 does not block strings beginning with a ! character NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter(CVE-2018-20969) GNU patch through 276 is vulnerable to OS shell command injection that can be exploited by opening ...
A double-free flaw was found in the way the patch utility processed patch files An attacker could potentially use this flaw to crash the patch utility by tricking it into processing crafted patches ...
A double free exists in the another_hunk function in pchc in GNU patch through 276 An attacker could potentially use this flaw to crash the patch utility by tricking it into processing crafted patches ...

Github Repositories

UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities

UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities Directed Greybox Fuzzing (DGF) like AFLGo aims to perform stress testing on pre-selected potentially vulnerable target locations, with applications to different security contexts: (1) bug reproduction, (2) patch testing or (3) static analysis report verification There are recently more research work that