{"id":"UBUNTU-CVE-2010-4651","details":"Directory traversal vulnerability in util.c in GNU patch 2.6.1 and earlier allows user-assisted remote attackers to create or overwrite arbitrary files via a filename that is specified with a .. (dot dot) or full pathname, a related issue to CVE-2010-1679.","modified":"2026-02-04T04:17:38.517276Z","published":"2011-03-11T00:00:00Z","withdrawn":"2025-07-18T16:42:40Z","related":["USN-2651-1"],"upstream":["CVE-2010-4651"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2010-4651"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2651-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2010-4651"}],"affected":[{"package":{"name":"patch","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/patch@2.7.1-4ubuntu1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.7.1-4ubuntu1"}]}],"versions":["2.7.1-3","2.7.1-4"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"2.7.1-4ubuntu1","binary_name":"patch"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2010/UBUNTU-CVE-2010-4651.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"low"}]}