patch: apply upstream patch for CVE-2019-13638
authorRussell Senior <russell@personaltelco.net>
Sun, 11 Aug 2019 19:43:41 +0000 (12:43 -0700)
committerRosen Penev <rosenp@gmail.com>
Fri, 27 Sep 2019 02:36:21 +0000 (19:36 -0700)
commit89b362e22b75eed9840bb3e97dd5fdf786060fa9
treeda0e7f38d80cd685ccd1d0e6b92182b35c57fa9c
parentd91bbb197137e9535f2e6f3dd4252a5c8a4690e3
patch: apply upstream patch for CVE-2019-13638

GNU patch through 2.7.6 is vulnerable to OS shell command injection that
can be exploited by opening a crafted patch file that contains an ed style
diff payload with shell metacharacters. The ed editor does not need to be
present on the vulnerable system. This is different from CVE-2018-1000156.

https://nvd.nist.gov/vuln/detail/CVE-2019-13638

Signed-off-by: Russell Senior <russell@personaltelco.net>
(cherry-picked from b82198ff479c4f425da96534f5049bc7d3808065)
devel/patch/Makefile
devel/patch/patches/060-CVE-2019-13638.patch [new file with mode: 0644]