MGASA-2020-0093 - Updated patch packages fix security vulnerabilities

Publication date: 21 Feb 2020
URL: https://advisories.mageia.org/MGASA-2020-0093.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2019-13636,
     CVE-2019-13638,
     CVE-2018-20969

Updated patch package fixes security vulnerabilities:

* In GNU patch through 2.7.6, the following of symlinks is mishandled
  in certain cases other than input files. (CVE-2019-13636).

* A vulnerability was found in GNU patch through 2.7.6 is vulnerable to
  OS shell command injection that can be exploited by opening a crafted
  patch file that contains an ed style diff payload with shell
  metacharacters (CVE-2019-13638).

* A vulnerability was found in do_ed_script in pch.c in GNU patch through
  2.7.6 does not block strings beginning with a ! character. NOTE: this
 is the same commit as for CVE-2019-13638, but the ! syntax is specific to
  ed, and is unrelated to a shell metacharacter (CVE-2018-20969).

References:
- https://bugs.mageia.org/show_bug.cgi?id=25279
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/
- https://access.redhat.com/errata/RHSA-2019:2798
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13636
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13638
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20969

SRPMS:
- 7/core/patch-2.7.6-4.1.mga7

Mageia 2020-0093: patch security update

Updated patch package fixes security vulnerabilities: * In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files

Summary

Updated patch package fixes security vulnerabilities:
* In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. (CVE-2019-13636).
* A vulnerability was found in GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters (CVE-2019-13638).
* A vulnerability was found in do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter (CVE-2018-20969).

References

- https://bugs.mageia.org/show_bug.cgi?id=25279

- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/

- https://access.redhat.com/errata/RHSA-2019:2798

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13636

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13638

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20969

Resolution

MGASA-2020-0093 - Updated patch packages fix security vulnerabilities

SRPMS

- 7/core/patch-2.7.6-4.1.mga7

Severity
Publication date: 21 Feb 2020
URL: https://advisories.mageia.org/MGASA-2020-0093.html
Type: security
CVE: CVE-2019-13636, CVE-2019-13638, CVE-2018-20969

Related News