patch: CVE-2015-1196: directory traversal via symlinks

Related Vulnerabilities: CVE-2015-1196  

Debian Bug report logs - #775227
patch: CVE-2015-1196: directory traversal via symlinks

version graph

Package: patch; Maintainer for patch is Laszlo Boszormenyi (GCS) <gcs@debian.org>; Source for patch is src:patch (PTS, buildd, popcon).

Reported by: Jakub Wilk <jwilk@debian.org>

Date: Mon, 12 Jan 2015 19:27:02 UTC

Severity: normal

Tags: security, upstream

Found in version patch/2.7.1-6

Fixed in version patch/2.7.1-7

Done: Laszlo Boszormenyi (GCS) <gcs@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, jwilk@debian.org, Laszlo Boszormenyi (GCS) <gcs@debian.org>:
Bug#775227; Package patch. (Mon, 12 Jan 2015 19:27:06 GMT) (full text, mbox, link).


Message #3 received at submit@bugs.debian.org (full text, mbox, reply):

From: Jakub Wilk <jwilk@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: patch: directory traversal via symlinks
Date: Mon, 12 Jan 2015 20:25:20 +0100
[Message part 1 (text/plain, inline)]
Package: patch
Version: 2.7.1-6
Tags: security

patch now support git-style patches, which allows creating symlinks. 
This feature can be abused for directory traversal. As a proof of 
concept, applying the attached patch creates a file in /tmp:

$ ls /tmp/moo
/bin/ls: cannot access /tmp/moo: No such file or directory

$ mkdir empty && cd empty

$ patch -p1 < ~/traversal.diff
patching symbolic link tmp
patching file tmp/moo

$ ls /tmp/moo
/tmp/moo


-- System Information:
Debian Release: 8.0
 APT prefers unstable
 APT policy: (990, 'unstable'), (500, 'experimental')
Architecture: i386 (x86_64)
Foreign Architectures: amd64

Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=pl_PL.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages patch depends on:
ii  libc6  2.19-13

-- 
Jakub Wilk
[traversal.diff (text/x-diff, attachment)]

Information forwarded to debian-bugs-dist@lists.debian.org, Laszlo Boszormenyi (GCS) <gcs@debian.org>:
Bug#775227; Package patch. (Sun, 18 Jan 2015 20:39:08 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Laszlo Boszormenyi (GCS) <gcs@debian.org>. (Sun, 18 Jan 2015 20:39:08 GMT) (full text, mbox, link).


Message #8 received at 775227@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Jakub Wilk <jwilk@debian.org>, 775227@bugs.debian.org
Subject: Re: Bug#775227: patch: directory traversal via symlinks
Date: Sun, 18 Jan 2015 21:36:51 +0100
Control: retitle -1 patch: CVE-2015-1196: directory traversal via symlinks

Hi,

This has been assigned CVE-2015-1196 by MITRE.

Regards,
Salvatore



Changed Bug title to 'patch: CVE-2015-1196: directory traversal via symlinks' from 'patch: directory traversal via symlinks' Request was from Salvatore Bonaccorso <carnil@debian.org> to 775227-submit@bugs.debian.org. (Sun, 18 Jan 2015 20:39:08 GMT) (full text, mbox, link).


Added tag(s) upstream. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Mon, 19 Jan 2015 06:48:04 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Laszlo Boszormenyi (GCS) <gcs@debian.org>:
Bug#775227; Package patch. (Tue, 20 Jan 2015 11:12:05 GMT) (full text, mbox, link).


Acknowledgement sent to Andreas Grünbacher <andreas.gruenbacher@gmail.com>:
Extra info received and forwarded to list. Copy sent to Laszlo Boszormenyi (GCS) <gcs@debian.org>. (Tue, 20 Jan 2015 11:12:05 GMT) (full text, mbox, link).


Message #17 received at 775227@bugs.debian.org (full text, mbox, reply):

From: Andreas Grünbacher <andreas.gruenbacher@gmail.com>
To: 775227@bugs.debian.org
Subject: Fixed upstream
Date: Tue, 20 Jan 2015 12:08:54 +0100
[Message part 1 (text/plain, inline)]
This fix in the upstream git repository should take care of this bug.
[CVE-2015-1196.diff (text/plain, attachment)]

Information forwarded to debian-bugs-dist@lists.debian.org, Laszlo Boszormenyi (GCS) <gcs@debian.org>:
Bug#775227; Package patch. (Tue, 20 Jan 2015 11:39:08 GMT) (full text, mbox, link).


Acknowledgement sent to László Böszörményi (GCS) <gcs@debian.org>:
Extra info received and forwarded to list. Copy sent to Laszlo Boszormenyi (GCS) <gcs@debian.org>. (Tue, 20 Jan 2015 11:39:08 GMT) (full text, mbox, link).


Message #22 received at 775227@bugs.debian.org (full text, mbox, reply):

From: László Böszörményi (GCS) <gcs@debian.org>
To: Andreas Grünbacher <andreas.gruenbacher@gmail.com>, 775227@bugs.debian.org
Subject: Re: Bug#775227: Fixed upstream
Date: Tue, 20 Jan 2015 12:37:03 +0100
On Tue, Jan 20, 2015 at 12:08 PM, Andreas Grünbacher
<andreas.gruenbacher@gmail.com> wrote:
> This fix in the upstream git repository should take care of this bug.
 Yes, I know as I was the one who reported it to upstream. There are
two more important bugs that I wait fixes for. Will upload those as
soon as possible.

Thanks anyway,
Laszlo/GCS



Information forwarded to debian-bugs-dist@lists.debian.org, Laszlo Boszormenyi (GCS) <gcs@debian.org>:
Bug#775227; Package patch. (Tue, 20 Jan 2015 11:51:04 GMT) (full text, mbox, link).


Acknowledgement sent to Andreas Grünbacher <andreas.gruenbacher@gmail.com>:
Extra info received and forwarded to list. Copy sent to Laszlo Boszormenyi (GCS) <gcs@debian.org>. (Tue, 20 Jan 2015 11:51:04 GMT) (full text, mbox, link).


Message #27 received at 775227@bugs.debian.org (full text, mbox, reply):

From: Andreas Grünbacher <andreas.gruenbacher@gmail.com>
To: László Böszörményi (GCS) <gcs@debian.org>
Cc: 775227 <775227@bugs.debian.org>
Subject: Re: Bug#775227: Fixed upstream
Date: Tue, 20 Jan 2015 12:49:09 +0100
Well I hope those are fixed as well now.



Reply sent to Laszlo Boszormenyi (GCS) <gcs@debian.org>:
You have taken responsibility. (Tue, 20 Jan 2015 21:22:39 GMT) (full text, mbox, link).


Notification sent to Jakub Wilk <jwilk@debian.org>:
Bug acknowledged by developer. (Tue, 20 Jan 2015 21:22:39 GMT) (full text, mbox, link).


Message #32 received at 775227-close@bugs.debian.org (full text, mbox, reply):

From: Laszlo Boszormenyi (GCS) <gcs@debian.org>
To: 775227-close@bugs.debian.org
Subject: Bug#775227: fixed in patch 2.7.1-7
Date: Tue, 20 Jan 2015 21:18:53 +0000
Source: patch
Source-Version: 2.7.1-7

We believe that the bug you reported is fixed in the latest version of
patch, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 775227@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Laszlo Boszormenyi (GCS) <gcs@debian.org> (supplier of updated patch package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 20 Jan 2015 19:34:19 +0000
Source: patch
Binary: patch
Architecture: source amd64
Version: 2.7.1-7
Distribution: unstable
Urgency: high
Maintainer: Laszlo Boszormenyi (GCS) <gcs@debian.org>
Changed-By: Laszlo Boszormenyi (GCS) <gcs@debian.org>
Description:
 patch      - Apply a diff file to an original
Closes: 775227 775540 775793
Changes:
 patch (2.7.1-7) unstable; urgency=high
 .
   * Backport patches from upstream Git tree:
     - fix CVE-2015-119: directory traversal via symlinks (closes: #775227),
     - infinite loop while applying patch (closes: #775540),
     - segmentation fault while applying corrupted patch (closes: #775793).
Checksums-Sha1:
 3ccd6e6153fe56cd6c8d8d9da65ac0f7b8364b96 1751 patch_2.7.1-7.dsc
 bbd77e7fdebd12348c9f91ee89946bbddd2756be 12448 patch_2.7.1-7.debian.tar.xz
 6947302639febb8e6ccc241a8cf96f969830ee89 97324 patch_2.7.1-7_amd64.deb
Checksums-Sha256:
 390dd7f91f6a1490fe20a5f773fd93e906648ca267dca82e42541e36a9bab417 1751 patch_2.7.1-7.dsc
 f644d8fc6b0e7d3a92fd51ea631f1454645192380f126a96ca89aa6f359a03de 12448 patch_2.7.1-7.debian.tar.xz
 0183b9f43e9912d177d81ecc094150d12a825d9cd927f0554df9683c39273626 97324 patch_2.7.1-7_amd64.deb
Files:
 fb67b05e757cfefacaacb4cc17f8c786 1751 vcs standard patch_2.7.1-7.dsc
 c1390b649f17fc4f4542fac704a49a01 12448 vcs standard patch_2.7.1-7.debian.tar.xz
 a4912dd0292de7c728200dc05061cd53 97324 vcs standard patch_2.7.1-7_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Azom
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Thu, 12 Mar 2015 07:26:03 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 13:57:10 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.