GNU patch through version 2.7.6 is vulnerable to a double freeing of memory when supplied a crafted patch file leading to a crash. Upstream Issue: https://savannah.gnu.org/bugs/index.php?53133
Created patch tracking bugs for this issue: Affects: fedora-all [bug 1545054]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2033 https://access.redhat.com/errata/RHSA-2019:2033
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-6952