First published: Fri Jul 26 2019(Updated: )
A vulnerability was found in GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from <a href="https://access.redhat.com/security/cve/CVE-2018-1000156">CVE-2018-1000156</a>. Reference: <a href="https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0">https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU patch | =2.7.6 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/patch | 2.7.6-7 |
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13638 is a vulnerability in the GNU patch tool that allows for OS shell command injection.
CVE-2019-13638 has a severity score of 7.8, which is considered critical.
The GNU patch tool versions 2.7.6 and below are affected by CVE-2019-13638.
CVE-2019-13638 can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters.
Yes, patches are available to address the vulnerability. Please refer to the official references for remediation information.