First published: Wed Jul 17 2019(Updated: )
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/patch | <=2.7.6-4<=2.7.6-3 | 2.7.6-5 2.7.6-3+deb10u1 2.7.5-1+deb9u2 |
GNU patch | <=2.7.6 | |
debian/patch | 2.7.6-7 |
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13636 has been rated as medium severity due to mishandling of symlinks in GNU patch.
To fix CVE-2019-13636, upgrade GNU patch to version 2.7.6-7 or later.
CVE-2019-13636 affects GNU patch versions up to and including 2.7.6.
CVE-2019-13636 impacts GNU patch software, particularly versions prior to 2.7.6.
CVE-2019-13636 is primarily noted in Debian distributions using affected versions of GNU patch.