patch: apply upstream patch for CVE-2019-13638 9692/head
authorRussell Senior <russell@personaltelco.net>
Sun, 11 Aug 2019 19:43:41 +0000 (12:43 -0700)
committerRussell Senior <russell@personaltelco.net>
Sun, 11 Aug 2019 20:01:04 +0000 (13:01 -0700)
commitb82198ff479c4f425da96534f5049bc7d3808065
tree06039f03a2c3fa6835bd106287ea88b4cf150161
parent7a783ee8717cbb686c9fcbe5da13116e7edf0255
patch: apply upstream patch for CVE-2019-13638

GNU patch through 2.7.6 is vulnerable to OS shell command injection that
can be exploited by opening a crafted patch file that contains an ed style
diff payload with shell metacharacters. The ed editor does not need to be
present on the vulnerable system. This is different from CVE-2018-1000156.

https://nvd.nist.gov/vuln/detail/CVE-2019-13638

Signed-off-by: Russell Senior <russell@personaltelco.net>
devel/patch/Makefile
devel/patch/patches/060-CVE-2019-13638.patch [new file with mode: 0644]