First published: Thu Aug 29 2019(Updated: )
A vulnerability was found in do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for <a href="https://access.redhat.com/security/cve/CVE-2019-13638">CVE-2019-13638</a>, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter. Reference: <a href="https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0">https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0</a> <a href="https://seclists.org/bugtraq/2019/Aug/29">https://seclists.org/bugtraq/2019/Aug/29</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Patch | <=2.7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1746672 is categorized as a moderate security risk, as exploited vulnerabilities can lead to unintended command execution.
To fix REDHAT-BUG-1746672, update the GNU patch software to a version later than 2.7.6.
GNU patch versions through 2.7.6 are affected by REDHAT-BUG-1746672.
The vulnerability in REDHAT-BUG-1746672 allows for improper handling of input strings beginning with a '!' character.
Yes, REDHAT-BUG-1746672 is related to CVE-2019-13638, as they stem from the same commit.