Description
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1864-1 | patch security update |
Debian DSA |
DSA-4489-1 | patch security update |
EUVD |
EUVD-2019-5066 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. |
Ubuntu USN |
USN-4071-1 | Patch vulnerabilities |
Ubuntu USN |
USN-4071-2 | Patch vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:57:39.539Z
Reserved: 2019-07-17T00:00:00.000Z
Link: CVE-2019-13638
No data.
Status : Modified
Published: 2019-07-26T13:15:12.783
Modified: 2024-11-21T04:25:25.007
Link: CVE-2019-13638
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN