Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in patch
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in patch
ID: FEDORA-2015-1165
Distribution: Fedora
Plattformen: Fedora 20
Datum: Sa, 4. April 2015, 11:23
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9637
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1196
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1395

Originalnachricht

Name        : patch
Product : Fedora 20
Version : 2.7.5
Release : 1.fc20
URL : http://www.gnu.org/software/patch/patch.html
Summary : Utility for modifying/upgrading files
Description :
The patch program applies diff files to originals. The diff command
is used to compare an original to a changed file. Diff lists the
changes made to the file. A person who has the original file can then
use the patch command with the diff file to add the changes to their
original file (patching the file).

Patch should be installed because it is a common way of upgrading
applications.

-------------------------------------------------------------------------------
-
Update Information:

Security fixes for CVE-2014-9637, CVE-2015-1196, and an infinite loop with a
crafted diff.
-------------------------------------------------------------------------------
-
ChangeLog:

* Mon Mar 9 2015 Tim Waugh <twaugh@redhat.com> - 2.7.5-1
- Fixed memory leak in selinux patch.
- 2.7.5, including an even better fix for CVE-2015-1196 that still
allows relative symlinks to be created/used.
* Sun Feb 1 2015 Tim Waugh <twaugh@redhat.com> - 2.7.4-1
- 2.7.4, including a better fix for CVE-2015-1196 that still allows
symlinks referencing ".." to be created.
* Fri Jan 23 2015 Tim Waugh <twaugh@redhat.com> - 2.7.3-1
- 2.7.3 (bug #1182157, CVE-2015-1196, bug #1184491, CVE-2014-9637).
* Tue Jan 20 2015 Tim Waugh <twaugh@redhat.com> - 2.7.1-12
- Apply upstream patch to fix line numbering integer overflow.
* Tue Jan 20 2015 Tim Waugh <twaugh@redhat.com> - 2.7.1-11
- Apply upstream patch to fix directory traversal via symlinks
(bug #1182157, CVE-2015-1196).
* Sun Aug 17 2014 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> - 2.7.1-9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
* Fri Jun 6 2014 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> - 2.7.1-8
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1188578 - patch: infinite loop with a crafted diff
https://bugzilla.redhat.com/show_bug.cgi?id=1188578
[ 2 ] Bug #1185262 - CVE-2014-9637 patch: local denial of service with a
crafted patch
https://bugzilla.redhat.com/show_bug.cgi?id=1185262
[ 3 ] Bug #1184490 - CVE-2015-1395 patch: directory traversal via file rename
https://bugzilla.redhat.com/show_bug.cgi?id=1184490
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update patch' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung