{"id":"CVE-2015-1395","details":"Directory traversal vulnerability in GNU patch versions which support Git-style patching before 2.7.3 allows remote attackers to write to arbitrary files with the permissions of the target user via a .. (dot dot) in a diff file name.","modified":"2026-04-16T01:41:48.655603951Z","published":"2017-08-25T18:29:00Z","withdrawn":"2026-01-27T04:13:47.750138Z","related":["SUSE-SU-2015:1019-1"],"references":[{"type":"FIX","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154214.html"},{"type":"FIX","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148953.html"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2015/01/27/28"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/72846"},{"type":"FIX","url":"http://www.ubuntu.com/usn/USN-2651-1"},{"type":"REPORT","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775873"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1184490"},{"type":"FIX","url":"https://savannah.gnu.org/bugs/?44059"},{"type":"REPORT","url":"https://git.savannah.gnu.org/cgit/patch.git/commit/?id=17953b5893f7c9835f0dd2a704ba04e0371d2cbd"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}