5.8
CVSSv2

CVE-2019-13636

Published: 17/07/2019 Updated: 07/11/2023
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P

Vulnerability Summary

In GNU patch up to and including 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu patch

Vendor Advisories

Debian Bug report logs - #932401 patch: CVE-2019-13636 Package: src:patch; Maintainer for src:patch is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 18 Jul 2019 19:30:16 UTC Severity: grave Tags: security, upstream Found in versions patch/276-4, patch/2 ...
Several security issues were fixed in Patch ...
Several security issues were fixed in Patch ...
Synopsis Moderate: patch security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for patch is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base s ...
Synopsis Moderate: OpenShift Container Platform 461 image security update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat OpenShift Container Platform 46Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability S ...
Imre Rad discovered several vulnerabilities in GNU patch, leading to shell command injection or escape from the working directory and access and overwrite files, if specially crafted patch files are processed This update includes a bugfix for a regression introduced by the patch to address CVE-2018-1000156 when applying an ed-style patch (#933140) ...
In GNU patch through 276, the following of symlinks is mishandled in certain cases other than input files This affects inpc and utilc (CVE-2019-13636) ...
Impact: Moderate Public Date: 2019-07-24 CWE: CWE-59 Bugzilla: 1732781: CVE-2019-13636 patch: the follo ...

Github Repositories

The GNU patch utility was prone vulnerable to multiple attacks through version 2.7.6. You can find my related PoC files here.

GNU patch vulnerabilities I identified several vulnerabilities in the GNU patch utility, some of them making it possible to execute arbitrary code if the victim opens a crafted patch file It also turned out, some of these vulnerabilities had been silently addressed by the maintainer back then in 2018 when CVE-2018-1000156 was reported by pushing some additional commits the sam