|Type||Arbitrary command execution|
An arbitrary command execution vulnerability has been found in patch versions prior to 2.7.7 when applying ed-style patches. Due to insufficient sanitization of the input patch stream, it is possible for a patch file to cause patch to pass certain ed scripts to the ed editor, which would run commands. This issue could be exploited to execute arbitrary commands as the user invoking patch against a specially crafted patch file, which could be leveraged to obtain elevated privileges.
|12 Nov 2018||ASA-201811-14||AVG-808||patch||High||multiple issues|
|09 Oct 2018||ASA-201810-8||AVG-619||patch||High||multiple issues|