GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:57:39.539Z
Reserved: 2019-07-17T00:00:00
Link: CVE-2019-13638

No data.

Status : Modified
Published: 2019-07-26T13:15:12.783
Modified: 2024-11-21T04:25:25.007
Link: CVE-2019-13638
