Bug 915328 (CVE-2015-1395) - VUL-1: CVE-2015-1395: patch: directory traversal via file rename
Summary: VUL-1: CVE-2015-1395: patch: directory traversal via file rename
Status: RESOLVED FIXED
Alias: CVE-2015-1395
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Minor
Target Milestone: ---
Assignee: Jean Delvare
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/113241/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2015-01-29 09:30 UTC by Victor Pereira
Modified: 2016-10-05 06:37 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Victor Pereira 2015-01-29 09:30:44 UTC
rh#1184490

It was reported [1] that the versions of the patch utility that support Git-style patches are vulnerable to a directory traversal flaw. This could allow an attacker to overwrite arbitrary files by applying a specially crafted patch, with the privileges of the user running patch. A reproducer for this issue is available in [1].

Upstream bugreport: http://savannah.gnu.org/bugs/?44059

[1]: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775873


References:
https://bugzilla.redhat.com/show_bug.cgi?id=1184490
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1395
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1395.html
Comment 1 Swamp Workflow Management 2015-01-29 23:00:56 UTC
bugbot adjusting priority
Comment 2 Jean Delvare 2015-02-16 13:58:39 UTC
As far as I can see this is fixed since GNU patch version 2.7.3, presumably by commit "For renames and copies, make sure that both file names are valid":

http://git.savannah.gnu.org/cgit/patch.git/commit/?id=17953b5893f7c9835f0dd2a704ba04e0371d2cbd
Comment 3 Bernhard Wiedemann 2015-06-01 12:00:07 UTC
This is an autogenerated message for OBS integration:
This bug (915328) was mentioned in
https://build.opensuse.org/request/show/309612 13.2+13.1 / patch
Comment 5 Swamp Workflow Management 2015-06-09 14:05:33 UTC
SUSE-SU-2015:1019-1: An update that solves three vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 904519,913678,915328,915329
CVE References: CVE-2015-1196,CVE-2015-1395,CVE-2015-1396
Sources used:
SUSE Linux Enterprise Server 12 (src):    patch-2.7.5-7.1
SUSE Linux Enterprise Desktop 12 (src):    patch-2.7.5-7.1
Comment 6 Jean Delvare 2016-10-05 06:37:28 UTC
Fixed long ago, closing.