CVE-2019-13638

NameCVE-2019-13638
DescriptionGNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1864-1, DSA-4489-1, ELA-147-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
patch (PTS)jessie, jessie (lts)2.7.5-1+deb8u3fixed
stretch (security), stretch (lts), stretch2.7.5-1+deb9u2fixed
buster (security), buster, buster (lts)2.7.6-3+deb10u1fixed
sid, trixie, bullseye, bookworm2.7.6-7fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
patchsourcewheezy2.6.1-3+deb7u3ELA-147-1
patchsourcejessie2.7.5-1+deb8u3DLA-1864-1
patchsourcestretch2.7.5-1+deb9u2DSA-4489-1
patchsourcebuster2.7.6-3+deb10u1DSA-4489-1
patchsource(unstable)2.7.6-5

Notes

https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0

Search for package or bug name: Reporting problems