[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [bug-patch] ed scripts allow arbitrary code execution
From: |
Bruno Haible |
Subject: |
Re: [bug-patch] ed scripts allow arbitrary code execution |
Date: |
Fri, 06 Apr 2018 15:45:50 +0200 |
User-agent: |
KMail/5.1.3 (Linux/4.4.0-116-generic; KDE/5.18.0; x86_64; ; ) |
Hello Andreas,
> I see that my patch [1] was overlooked and then [2] was written the next
> day. It introduces at least 2 new code executions vulnerabilities
> relating to filenames containing $(..).
Indeed, the gnulib module 'sh-quote' [1] can help to avoid misquoting in
shell command-lines.
Additionally, the gnulib module 'execute' [2] ensures portability to Windows,
since it replaces the uses of 'fork()'.
Bruno
[1] https://www.gnu.org/software/gnulib/MODULES.html#module=sh-quote
[2] https://www.gnu.org/software/gnulib/MODULES.html#module=execute