{"id":"UBUNTU-CVE-2019-20633","details":"GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952.","modified":"2026-01-20T17:10:53.887216Z","published":"2020-03-25T17:15:00Z","upstream":["CVE-2019-20633"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-20633"},{"type":"REPORT","url":"https://savannah.gnu.org/bugs/index.php?56683"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2019-20633"}],"affected":[{"package":{"name":"patch","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/patch@2.7.1-4ubuntu2.4+esm1?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.7.1-3","2.7.1-4","2.7.1-4ubuntu1","2.7.1-4ubuntu2","2.7.1-4ubuntu2.3","2.7.1-4ubuntu2.4","2.7.1-4ubuntu2.4+esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"patch","binary_version":"2.7.1-4ubuntu2.4+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-20633.json"}},{"package":{"name":"patch","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/patch@2.7.5-1ubuntu0.16.04.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.7.5-1","2.7.5-1ubuntu0.16.04.1","2.7.5-1ubuntu0.16.04.2"],"ecosystem_specific":{"binaries":[{"binary_name":"patch","binary_version":"2.7.5-1ubuntu0.16.04.2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-20633.json"}},{"package":{"name":"patch","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/patch@2.7.6-2ubuntu1.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.7.5-1build1","2.7.6-1","2.7.6-2ubuntu1","2.7.6-2ubuntu1.1"],"ecosystem_specific":{"binaries":[{"binary_name":"patch","binary_version":"2.7.6-2ubuntu1.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-20633.json"}},{"package":{"name":"patch","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/patch@2.7.6-6?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.7.6-6"],"ecosystem_specific":{"binaries":[{"binary_name":"patch","binary_version":"2.7.6-6"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-20633.json"}},{"package":{"name":"patch","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/patch@2.7.6-7build2?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.7.6-7","2.7.6-7build1","2.7.6-7build2"],"ecosystem_specific":{"binaries":[{"binary_name":"patch","binary_version":"2.7.6-7build2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-20633.json"}},{"package":{"name":"patch","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/patch@2.7.6-7build3?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.7.6-7build2","2.7.6-7build3"],"ecosystem_specific":{"binaries":[{"binary_name":"patch","binary_version":"2.7.6-7build3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-20633.json"}},{"package":{"name":"patch","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/patch@2.8-2?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.7.6-7build3","2.8-1","2.8-2"],"ecosystem_specific":{"binaries":[{"binary_name":"patch","binary_version":"2.8-2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-20633.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"negligible"}]}