CVE-2019-13638

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 86%
VendorProductVersion
gnupatch
2.7.6
debiandebian_linux
8.0
debiandebian_linux
9.0
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
patch
sid
2.7.6-7
fixed
trixie
2.7.6-7
fixed
bookworm
2.7.6-7
fixed
bullseye
2.7.6-7
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
patch
disco
Fixed 2.7.6-3ubuntu0.1
released
bionic
Fixed 2.7.6-2ubuntu1.1
released
xenial
Fixed 2.7.5-1ubuntu0.16.04.2
released
trusty
Fixed 2.7.1-4ubuntu2.4+esm1
released
References