CVE-2019-13638

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
References
Link Resource
http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
https://access.redhat.com/errata/RHSA-2019:2798
https://access.redhat.com/errata/RHSA-2019:2964
https://access.redhat.com/errata/RHSA-2019:3757
https://access.redhat.com/errata/RHSA-2019:3758
https://access.redhat.com/errata/RHSA-2019:4061
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 Mailing List Patch Vendor Advisory
https://github.com/irsl/gnu-patch-vulnerabilities
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/
https://seclists.org/bugtraq/2019/Aug/29
https://seclists.org/bugtraq/2019/Jul/54 Mailing List Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2019-13638 Third Party Advisory
https://security.gentoo.org/glsa/201908-22
https://security.netapp.com/advisory/ntap-20190828-0001/
https://www.debian.org/security/2019/dsa-4489 Third Party Advisory
http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
https://access.redhat.com/errata/RHSA-2019:2798
https://access.redhat.com/errata/RHSA-2019:2964
https://access.redhat.com/errata/RHSA-2019:3757
https://access.redhat.com/errata/RHSA-2019:3758
https://access.redhat.com/errata/RHSA-2019:4061
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 Mailing List Patch Vendor Advisory
https://github.com/irsl/gnu-patch-vulnerabilities
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/
https://seclists.org/bugtraq/2019/Aug/29
https://seclists.org/bugtraq/2019/Jul/54 Mailing List Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2019-13638 Third Party Advisory
https://security.gentoo.org/glsa/201908-22
https://security.netapp.com/advisory/ntap-20190828-0001/
https://www.debian.org/security/2019/dsa-4489 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:patch:2.7.6:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:25

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html - () http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html -
References () https://access.redhat.com/errata/RHSA-2019:2798 - () https://access.redhat.com/errata/RHSA-2019:2798 -
References () https://access.redhat.com/errata/RHSA-2019:2964 - () https://access.redhat.com/errata/RHSA-2019:2964 -
References () https://access.redhat.com/errata/RHSA-2019:3757 - () https://access.redhat.com/errata/RHSA-2019:3757 -
References () https://access.redhat.com/errata/RHSA-2019:3758 - () https://access.redhat.com/errata/RHSA-2019:3758 -
References () https://access.redhat.com/errata/RHSA-2019:4061 - () https://access.redhat.com/errata/RHSA-2019:4061 -
References () https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 - Mailing List, Patch, Vendor Advisory () https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 - Mailing List, Patch, Vendor Advisory
References () https://github.com/irsl/gnu-patch-vulnerabilities - () https://github.com/irsl/gnu-patch-vulnerabilities -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/ -
References () https://seclists.org/bugtraq/2019/Aug/29 - () https://seclists.org/bugtraq/2019/Aug/29 -
References () https://seclists.org/bugtraq/2019/Jul/54 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/Jul/54 - Mailing List, Third Party Advisory
References () https://security-tracker.debian.org/tracker/CVE-2019-13638 - Third Party Advisory () https://security-tracker.debian.org/tracker/CVE-2019-13638 - Third Party Advisory
References () https://security.gentoo.org/glsa/201908-22 - () https://security.gentoo.org/glsa/201908-22 -
References () https://security.netapp.com/advisory/ntap-20190828-0001/ - () https://security.netapp.com/advisory/ntap-20190828-0001/ -
References () https://www.debian.org/security/2019/dsa-4489 - Third Party Advisory () https://www.debian.org/security/2019/dsa-4489 - Third Party Advisory

07 Nov 2023, 03:03

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/', 'name': 'FEDORA-2019-ac709da87f', 'tags': [], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/ -

Information

Published : 2019-07-26 13:15

Updated : 2024-11-21 04:25


NVD link : CVE-2019-13638

Mitre link : CVE-2019-13638

CVE.ORG link : CVE-2019-13638


JSON object : View

Products Affected

gnu

  • patch

debian

  • debian_linux
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')