In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a | mailing list patch vendor advisory |
https://lists.debian.org/debian-lts-announce/2019/07/msg00016.html | third party advisory mailing list |
https://usn.ubuntu.com/4071-1/ | vendor advisory |
https://usn.ubuntu.com/4071-2/ | vendor advisory |
https://www.debian.org/security/2019/dsa-4489 | vendor advisory |
https://seclists.org/bugtraq/2019/Jul/54 | mailing list |
https://seclists.org/bugtraq/2019/Aug/29 | mailing list |
http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html | |
https://security.gentoo.org/glsa/201908-22 | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/ | vendor advisory |
https://security.netapp.com/advisory/ntap-20190828-0001/ | |
https://github.com/irsl/gnu-patch-vulnerabilities |