GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1864-1 patch security update
Debian DSA Debian DSA DSA-4489-1 patch security update
EUVD EUVD EUVD-2019-5066 GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
Ubuntu USN Ubuntu USN USN-4071-1 Patch vulnerabilities
Ubuntu USN Ubuntu USN USN-4071-2 Patch vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:57:39.539Z

Reserved: 2019-07-17T00:00:00

Link: CVE-2019-13638

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-07-26T13:15:12.783

Modified: 2024-11-21T04:25:25.007

Link: CVE-2019-13638

cve-icon Redhat

Severity : Important

Publid Date: 2019-07-29T00:00:00Z

Links: CVE-2019-13638 - Bugzilla

cve-icon OpenCVE Enrichment

No data.