GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-1864-1 | patch security update |
![]() |
DSA-4489-1 | patch security update |
![]() |
EUVD-2019-5066 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. |
![]() |
USN-4071-1 | Patch vulnerabilities |
![]() |
USN-4071-2 | Patch vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:57:39.539Z
Reserved: 2019-07-17T00:00:00
Link: CVE-2019-13638

No data.

Status : Modified
Published: 2019-07-26T13:15:12.783
Modified: 2024-11-21T04:25:25.007
Link: CVE-2019-13638


No data.