U radu programskog paketa patch, namijenjenog operacijskim sustavima Fedora 13 i 14, uočen je sigurnosni nedostatak. Riječ je o aplikaciji namijenjenoj automatizaciji nadogradnje i ažuriranja. Uočeni se nedostatak pojavljuje zbog dozvoljenog upisa vrijednosti ".." prilikom zadavanja putanje do datoteke koja se nadograđuje. Zlonamjerni korisnici to mogu iskoristiti za podmetanje datoteka na proizvoljnim lokacijama. Svim se korisnicima savjetuje primjena odgovarajućih rješenja kako bi uklonili uočeni nedostatak.

--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-1269
2011-02-10 20:46:47
--------------------------------------------------------------------------------

Name        : patch
Product     : Fedora 13
Version     : 2.6.1
Release     : 8.fc13
URL         : http://www.gnu.org/software/patch/patch.html
Summary     : Utility for modifying/upgrading files
Description :
The patch program applies diff files to originals. The diff command
is used to compare an original to a changed file. Diff lists the
changes made to the file.  A person who has the original file can then
use the patch command with the diff file to add the changes to their
original file (patching the file).

Patch should be installed because it is a common way of upgrading
applications.

--------------------------------------------------------------------------------
Update Information:


Applied fix so that malicious patches cannot create files above the current
directory (CVE-2010-4651).
--------------------------------------------------------------------------------
ChangeLog:

* Thu Feb 10 2011 Tim Waugh <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 2.6.1-8
- Incorporate upstream fix for CVE-2010-4651 patch so that a target
  name given on the command line is not validated (bug #667529).
* Tue Feb  8 2011 Tim Waugh <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 2.6.1-7
- Applied upstream patch to fix CVE-2010-4651 so that malicious
  patches cannot create files above the current directory
  (bug #667529).
* Tue Jan  4 2011 Tim Waugh <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 2.6.1-5
- Use smp_mflags correctly (bug #665770).
* Mon Aug 16 2010 Tim Waugh <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 2.6.1-4
- Another fix for the selinux patch (bug #618215).
* Fri Aug  6 2010 Tim Waugh <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 2.6.1-3
- Fixed interpretation of return value from getfilecon().
- Fixed argument type for --get (bug #553624).
* Wed Mar 10 2010 Dennis Gilmore <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.>
- using -fstack-projector causes weirdness on 32 bit sparc so disabling for
now
* Wed Mar  3 2010 Tim Waugh <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 2.6.1-2
- Added comments for all patches.
- Ship COPYING file.
- Removed sparc ifdefs in spec file.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #667529 - CVE-2010-4651 patch: directory traversal flaw allows for
arbitrary file creation
        https://bugzilla.redhat.com/show_bug.cgi?id=667529
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update patch' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-1272
2011-02-10 20:46:53
--------------------------------------------------------------------------------

Name        : patch
Product     : Fedora 14
Version     : 2.6.1
Release     : 8.fc14
URL         : http://www.gnu.org/software/patch/patch.html
Summary     : Utility for modifying/upgrading files
Description :
The patch program applies diff files to originals.  The diff command
is used to compare an original to a changed file.  Diff lists the
changes made to the file.  A person who has the original file can then
use the patch command with the diff file to add the changes to their
original file (patching the file).

Patch should be installed because it is a common way of upgrading
applications.

--------------------------------------------------------------------------------
Update Information:


Applied fix so that malicious patches cannot create files above the current
directory (CVE-2010-4651).
--------------------------------------------------------------------------------
ChangeLog:

* Thu Feb 10 2011 Tim Waugh <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 2.6.1-8
- Incorporate upstream fix for CVE-2010-4651 patch so that a target
  name given on the command line is not validated (bug #667529).
* Tue Feb  8 2011 Tim Waugh <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 2.6.1-7
- Applied upstream patch to fix CVE-2010-4651 so that malicious
  patches cannot create files above the current directory
  (bug #667529).
* Tue Jan  4 2011 Tim Waugh <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 2.6.1-6
- Use smp_mflags correctly (bug #665770).
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #667529 - CVE-2010-4651 patch: directory traversal flaw allows for
arbitrary file creation
        https://bugzilla.redhat.com/show_bug.cgi?id=667529
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update patch' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce

Idi na vrh