GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1864-1 | patch security update |
Debian DSA |
DSA-4489-1 | patch security update |
EUVD |
EUVD-2019-5066 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. |
Ubuntu USN |
USN-4071-1 | Patch vulnerabilities |
Ubuntu USN |
USN-4071-2 | Patch vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:57:39.539Z
Reserved: 2019-07-17T00:00:00
Link: CVE-2019-13638
No data.
Status : Modified
Published: 2019-07-26T13:15:12.783
Modified: 2024-11-21T04:25:25.007
Link: CVE-2019-13638
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN