Bug 25279 - patch new security issues CVE-2019-13636, CVE-2019-13638, and CVE-2018-20969
Summary: patch new security issues CVE-2019-13636, CVE-2019-13638, and CVE-2018-20969
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 7
Hardware: All Linux
Priority: Normal critical
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA7-64-OK
Keywords: advisory, has_procedure, validated_update
Depends on:
Blocks:
 
Reported: 2019-08-12 00:43 CEST by David Walser
Modified: 2020-02-22 00:07 CET (History)
5 users (show)

See Also:
Source RPM: patch-2.7.6-4.mga7.src.rpm
CVE:
Status comment: Patches available from Debian, Ubuntu, and Fedora


Attachments

Description David Walser 2019-08-12 00:43:12 CEST
Debian has issued an advisory on July 27:
https://www.debian.org/security/2019/dsa-4489

Mageia 6 and Mageia 7 are also affected.
David Walser 2019-08-12 00:43:19 CEST

Whiteboard: (none) => MGA7TOO, MGA6TOO

Comment 1 David Walser 2019-08-12 01:12:54 CEST
Ubuntu has issued an advisory for this on July 24:
https://usn.ubuntu.com/4071-1/
Comment 2 David Walser 2019-09-19 18:19:28 CEST
RedHat has issued an advisory on September 17:
https://access.redhat.com/errata/RHSA-2019:2798

It fixes one new CVE, CVE-2018-20969, which is fixed by the same commit that fixed CVE-2019-13638.

Summary: patch new security issues CVE-2019-13636 and CVE-2019-13638 => patch new security issues CVE-2019-13636, CVE-2019-13638, and CVE-2018-20969

Comment 3 David Walser 2019-12-23 22:39:22 CET
Fedora has issued an advisory for the first two CVEs on August 23:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/
David Walser 2020-01-14 18:03:54 CET

Status comment: (none) => Patches available from Debian, Ubuntu, and Fedora

Comment 4 Mike Rambo 2020-02-17 04:41:38 CET
Patched package uploaded for cauldron and Mageia 7.

Advisory:
========================

Updated patch package fixes security vulnerabilities:

* In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. (CVE-2019-13636).
* A vulnerability was found in GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters (CVE-2019-13638).
* A vulnerability was found in do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter (CVE-2018-20969).


References:
https://nvd.nist.gov/vuln/detail/CVE-2019-13636
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
https://nvd.nist.gov/vuln/detail/CVE-2018-20969
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/
https://access.redhat.com/errata/RHSA-2019:2798
========================

Updated packages in core/updates_testing:
========================
patch-2.7.6-4.1.mga7

from patch-2.7.6-4.1.mga7.src.rpm


Test procedure https://bugs.mageia.org/show_bug.cgi?id=22587#c11

Whiteboard: MGA7TOO, MGA6TOO => (none)
Version: Cauldron => 7
Keywords: (none) => has_procedure
Assignee: tmb => qa-bugs
CC: (none) => mrambo

Comment 5 Herman Viaene 2020-02-20 11:25:23 CET
MGA7-64 Plasma on Lenovo B50
No installation issues
Followed test as indicated above:
$ mkdir dir1
$ ln -s dir1 dir2
$ echo a > dir2/a
$ echo b > dir2/b
$ diff -u dir2/a dir2/b > foo.diff
$ patch -p0 < foo.diff
patching file dir2/a
[tester7@mach5 ~]$ more dir2/a
b

Is OK

CC: (none) => herman.viaene
Whiteboard: (none) => MGA7-64-OK

Comment 6 Thomas Andrews 2020-02-20 18:05:41 CET
Validating. Advisory in Comment 4.

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Thomas Backlund 2020-02-21 21:59:25 CET

Keywords: (none) => advisory
CC: (none) => tmb

Comment 7 Mageia Robot 2020-02-22 00:07:27 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2020-0093.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.