First published: Fri Aug 16 2019(Updated: )
A vulnerability was found in do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for <a href="https://access.redhat.com/security/cve/CVE-2019-13638">CVE-2019-13638</a>, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter. Reference: <a href="https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0">https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0</a> <a href="https://seclists.org/bugtraq/2019/Aug/29">https://seclists.org/bugtraq/2019/Aug/29</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU patch | <=2.7.6 |
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.