First published: Fri Apr 06 2018(Updated: )
GNU patch does not properly sanitize patch files allowing for malicious patches to pass arbitrary shell commands to ed. An attacker could exploit this by tricking a user into applying malicious patches with the patch command.
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Patch |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1564326 is considered high due to the potential for arbitrary command execution.
To fix REDHAT-BUG-1564326, update the GNU patch software to the latest version provided by your vendor.
REDHAT-BUG-1564326 affects systems utilizing the GNU patch utility.
Users of the GNU patch command who apply untrusted patches are particularly at risk from REDHAT-BUG-1564326.
REDHAT-BUG-1564326 enables attackers to execute arbitrary shell commands through malicious patch files.