CVE-2019-13638

EUVD-2019-5066
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 83%
Affected Products (NVD)
VendorProductVersion
gnupatch
2.7.6
debiandebian_linux
8.0
debiandebian_linux
9.0
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
patch
bookworm
2.7.6-7
fixed
bullseye
2.7.6-7
fixed
sid
2.7.6-7
fixed
trixie
2.7.6-7
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
patch
bionic
Fixed 2.7.6-2ubuntu1.1
released
disco
Fixed 2.7.6-3ubuntu0.1
released
trusty
Fixed 2.7.1-4ubuntu2.4+esm1
released
xenial
Fixed 2.7.5-1ubuntu0.16.04.2
released
References