Imre Rad discovered several vulnerabilities in GNU patch, leading to shell command injection or escape from the working directory and access and overwrite files, if specially crafted patch files are processed. This update includes a bugfix for a regression introduced by the patch to address CVE-2018-1000156 when applying an ed-style patch (#933140). For the oldstable distribution (stretch), these problems have been fixed in version 2.7.5-1+deb9u2. For the stable distribution (buster), these problems have been fixed in version 2.7.6-3+deb10u1. We recommend that you upgrade your patch packages. For the detailed security status of patch please refer to its security tracker page at: https://security-tracker.debian.org/tracker/patch
Imre Rad discovered several vulnerabilities in GNU patch, leading to shell command injection or escape from the working directory and access and overwrite files, if specially crafted patch files are processed.
This update includes a bugfix for a regression introduced by the patch to address CVE-2018-1000156 when applying an ed-style patch (#933140).
For the oldstable distribution (stretch), these problems have been fixed in version 2.7.5-1+deb9u2.
For the stable distribution (buster), these problems have been fixed in version 2.7.6-3+deb10u1.
We recommend that you upgrade your patch packages.
For the detailed security status of patch please refer to its security tracker page at: https://security-tracker.debian.org/tracker/patch