GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2019-07-26T12:22:43
Updated: 2024-08-04T23:57:39.539Z
Reserved: 2019-07-17T00:00:00
Link: CVE-2019-13638
Vulnrichment
No data.
NVD
Status : Modified
Published: 2019-07-26T13:15:12.783
Modified: 2024-11-21T04:25:25.007
Link: CVE-2019-13638
Redhat