First published: Mon Jul 29 2019(Updated: )
A vulnerability was found in GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from <a href="https://access.redhat.com/security/cve/CVE-2018-1000156">CVE-2018-1000156</a>. Reference: <a href="https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0">https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Patch | <=2.7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-1733916 is classified as a medium severity issue due to the potential for OS shell command injection.
To remediate REDHAT-BUG-1733916, update the GNU patch to version 2.7.7 or later, which addresses the vulnerability.
The vulnerability REDHAT-BUG-1733916 affects GNU patch versions up to and including 2.7.6.
REDHAT-BUG-1733916 facilitates OS shell command injection attacks via crafted patch files.
No, the ed editor does not need to be present on the system to exploit REDHAT-BUG-1733916.