
Cloud Vulnerability DB
A community-led vulnerabilities database
An Invalid Pointer vulnerability was discovered in GNU patch 2.7, identified as CVE-2021-45261. The vulnerability exists in the another_hunk function and was disclosed on December 22, 2021. This security flaw affects the GNU patch utility version 2.7 and potentially other versions (NVD, Ubuntu).
The vulnerability is classified as an Invalid Pointer or Reference issue (CWE-763) that occurs within the another_hunk function of GNU patch. The CVSS v3.1 base score is 5.5 (Medium), with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H. The vulnerability requires local access and user interaction to be exploited (NVD).
When successfully exploited, this vulnerability results in a Denial of Service condition. The impact is primarily focused on availability, with no direct effect on confidentiality or integrity of the system. The vulnerability specifically manifests when processing malformed patch files (Ubuntu, Debian).
As of March 2022, upstream has not released any updates or official fixes for this vulnerability. Multiple distributions, including Ubuntu and Debian, have marked this issue as 'fix deferred' due to its negligible security impact, as it only affects the CLI tool with specific malformed patch files (Ubuntu).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."