bug-patch
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[bug-patch] ed scripts allow arbitrary code execution


From: rain1
Subject: [bug-patch] ed scripts allow arbitrary code execution
Date: Fri, 06 Apr 2018 13:32:42 +0100
User-agent: Roundcube Webmail/1.3.3

Hello.

I see that my patch [1] was overlooked and then [2] was written the next day. It introduces at least 2 new code executions vulnerabilities relating to filenames containing $(..). I would recommend you avoid executing /bin/sh.

[1] http://lists.gnu.org/archive/html/bug-patch/2018-04/msg00000.html
[2] http://git.savannah.gnu.org/cgit/patch.git/commit/?id=123eaff0d5d1aebe128295959435b9ca5909c26d



reply via email to

[Prev in Thread] Current Thread [Next in Thread]