ALAS2-2018-1008 --- patchID: oval:org.secpod.oval:def:1700037 | Date: (C)2018-05-11 (M)2023-12-20 |
Class: PATCH | Family: unix |
Malicious patch files cause ed to execute arbitrary commandsGNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSDs CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.