CVE-2019-13638

NameCVE-2019-13638
DescriptionGNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1864-1, DSA-4489-1
NVD severityhigh (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
patch (PTS)jessie2.7.5-1+deb8u1vulnerable
jessie (security)2.7.5-1+deb8u3fixed
stretch2.7.5-1+deb9u1vulnerable
stretch (security)2.7.5-1+deb9u2fixed
buster2.7.6-3vulnerable
buster (security)2.7.6-3+deb10u1fixed
bullseye, sid2.7.6-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
patchsource(unstable)2.7.6-5high
patchsourcebuster2.7.6-3+deb10u1highDSA-4489-1
patchsourcejessie2.7.5-1+deb8u3highDLA-1864-1
patchsourcestretch2.7.5-1+deb9u2highDSA-4489-1

Notes

https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0

Search for package or bug name: Reporting problems