You are here
Home > Preporuke > Ranjivosti programskog paketa patch

Ranjivosti programskog paketa patch

  • Detalji os-a: FED
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2015-1165
2015-01-25 23:47:17
——————————————————————————–

Name : patch
Product : Fedora 20
Version : 2.7.5
Release : 1.fc20
URL : http://www.gnu.org/software/patch/patch.html
Summary : Utility for modifying/upgrading files
Description :
The patch program applies diff files to originals. The diff command
is used to compare an original to a changed file. Diff lists the
changes made to the file. A person who has the original file can then
use the patch command with the diff file to add the changes to their
original file (patching the file).

Patch should be installed because it is a common way of upgrading
applications.

——————————————————————————–
Update Information:

Security fixes for CVE-2014-9637, CVE-2015-1196, and an infinite loop with a crafted diff.
——————————————————————————–
ChangeLog:

* Mon Mar 9 2015 Tim Waugh <twaugh@redhat.com> – 2.7.5-1
– Fixed memory leak in selinux patch.
– 2.7.5, including an even better fix for CVE-2015-1196 that still
allows relative symlinks to be created/used.
* Sun Feb 1 2015 Tim Waugh <twaugh@redhat.com> – 2.7.4-1
– 2.7.4, including a better fix for CVE-2015-1196 that still allows
symlinks referencing “..” to be created.
* Fri Jan 23 2015 Tim Waugh <twaugh@redhat.com> – 2.7.3-1
– 2.7.3 (bug #1182157, CVE-2015-1196, bug #1184491, CVE-2014-9637).
* Tue Jan 20 2015 Tim Waugh <twaugh@redhat.com> – 2.7.1-12
– Apply upstream patch to fix line numbering integer overflow.
* Tue Jan 20 2015 Tim Waugh <twaugh@redhat.com> – 2.7.1-11
– Apply upstream patch to fix directory traversal via symlinks
(bug #1182157, CVE-2015-1196).
* Sun Aug 17 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 2.7.1-9
– Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
* Fri Jun 6 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 2.7.1-8
– Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #1188578 – patch: infinite loop with a crafted diff
https://bugzilla.redhat.com/show_bug.cgi?id=1188578
[ 2 ] Bug #1185262 – CVE-2014-9637 patch: local denial of service with a crafted patch
https://bugzilla.redhat.com/show_bug.cgi?id=1185262
[ 3 ] Bug #1184490 – CVE-2015-1395 patch: directory traversal via file rename
https://bugzilla.redhat.com/show_bug.cgi?id=1184490
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update patch’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorTomislav Protega
Cert idNCERT-REF-2015-04-0009-ADV
CveCVE-2014-9637 CVE-2015-1196 CVE-2015-1395
ID izvornikaFEDORA-2015-1165
Proizvodpatch
Izvorhttp://www.redhat.com
Top
More in Preporuke
Ranjivosti programskog paketa rt

Otkrivene su tri ranjivosti kod programskog paketa rt za Fedoru. Prva ranjivost može biti iskorištena preko email gatewaya te pogađa...

Close