Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.842253
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-2651-1)
Summary:The remote host is missing an update for the 'patch' package(s) announced via the USN-2651-1 advisory.
Description:Summary:
The remote host is missing an update for the 'patch' package(s) announced via the USN-2651-1 advisory.

Vulnerability Insight:
Jakub Wilk discovered that GNU patch did not correctly handle file paths in
patch files. An attacker could specially craft a patch file that could
overwrite arbitrary files with the privileges of the user invoking the program.
This issue only affected Ubuntu 12.04 LTS. (CVE-2010-4651)

Laszlo Boszormenyi discovered that GNU patch did not correctly handle some
patch files. An attacker could specially craft a patch file that could cause a
denial of service. (CVE-2014-9637)

Jakub Wilk discovered that GNU patch did not correctly handle symbolic links in
git style patch files. An attacker could specially craft a patch file that
could overwrite arbitrary files with the privileges of the user invoking the
program. This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10.
(CVE-2015-1196)

Jakub Wilk discovered that GNU patch did not correctly handle file renames in
git style patch files. An attacker could specially craft a patch file that
could overwrite arbitrary files with the privileges of the user invoking the
program. This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10.
(CVE-2015-1395)

Jakub Wilk discovered the fix for CVE-2015-1196 was incomplete for GNU patch.
An attacker could specially craft a patch file that could overwrite arbitrary
files with the privileges of the user invoking the program. This issue only
affected Ubuntu 14.04 LTS and Ubuntu 14.10. (CVE-2015-1396)

Affected Software/OS:
'patch' package(s) on Ubuntu 12.04, Ubuntu 14.04, Ubuntu 14.10.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:C/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-4651
43663
http://secunia.com/advisories/43663
43677
http://secunia.com/advisories/43677
46768
http://www.securityfocus.com/bid/46768
ADV-2011-0600
http://www.vupen.com/english/advisories/2011/0600
APPLE-SA-2011-06-23-1
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
FEDORA-2011-1269
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055246.html
FEDORA-2011-1272
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055241.html
[bug-patch] 20101230 Directory traversal vulnerability in patch (or dpkg-source) (fwd)
http://lists.gnu.org/archive/html/bug-patch/2010-12/msg00000.html
[oss-security] 20110105 CVE request: patch directory traversal flaw
http://openwall.com/lists/oss-security/2011/01/05/10
[oss-security] 20110106 Re: CVE request: patch directory traversal flaw
http://openwall.com/lists/oss-security/2011/01/06/19
http://openwall.com/lists/oss-security/2011/01/06/20
http://openwall.com/lists/oss-security/2011/01/06/21
http://git.savannah.gnu.org/cgit/patch.git/commit/?id=685a78b6052f4df6eac6d625a545cfb54a6ac0e1
http://support.apple.com/kb/HT4723
https://bugzilla.redhat.com/show_bug.cgi?id=667529
Common Vulnerability Exposure (CVE) ID: CVE-2014-9637
72286
http://www.securityfocus.com/bid/72286
FEDORA-2015-1134
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148953.html
FEDORA-2015-1165
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154214.html
USN-2651-1
http://www.ubuntu.com/usn/USN-2651-1
[oss-security] 20150122 Re: CVE request: directory traversal flaw in patch
http://www.openwall.com/lists/oss-security/2015/01/22/7
http://advisories.mageia.org/MGASA-2015-0068.html
https://bugzilla.redhat.com/show_bug.cgi?id=1185262
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=0c08d7a902c6fdd49b704623a12d8d672ef18944
https://savannah.gnu.org/bugs/?44051
Common Vulnerability Exposure (CVE) ID: CVE-2015-1196
BugTraq ID: 72074
http://www.securityfocus.com/bid/72074
http://seclists.org/oss-sec/2015/q1/173
SuSE Security Announcement: openSUSE-SU-2015:0199 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-02/msg00013.html
XForce ISS Database: gnupatch-unspecified-symlink(99967)
https://exchange.xforce.ibmcloud.com/vulnerabilities/99967
Common Vulnerability Exposure (CVE) ID: CVE-2015-1395
BugTraq ID: 72846
http://www.securityfocus.com/bid/72846
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775873
http://www.openwall.com/lists/oss-security/2015/01/27/28
Common Vulnerability Exposure (CVE) ID: CVE-2015-1396
BugTraq ID: 75358
http://www.securityfocus.com/bid/75358
http://www.openwall.com/lists/oss-security/2015/01/27/29
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.