Your message dated Sun, 21 Jul 2019 14:39:46 +0000
with message-id <e1hpd06-000dhy...@fasolo.debian.org>
and subject line Bug#932401: fixed in patch 2.7.6-5
has caused the Debian Bug report #932401,
regarding patch: CVE-2019-13636
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
932401: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=932401
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: patch
Version: 2.7.6-3
Severity: important
Tags: security upstream
Control: found -1 2.7.6-4
Hi,
The following vulnerability was published for patch.
CVE-2019-13636[0]:
| In GNU patch through 2.7.6, the following of symlinks is mishandled in
| certain cases other than input files. This affects inp.c and util.c.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2019-13636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13636
[1]
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: patch
Source-Version: 2.7.6-5
We believe that the bug you reported is fixed in the latest version of
patch, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 932...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Laszlo Boszormenyi (GCS) <g...@debian.org> (supplier of updated patch package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 21 Jul 2019 12:20:38 +0000
Source: patch
Architecture: source
Version: 2.7.6-5
Distribution: unstable
Urgency: high
Maintainer: Laszlo Boszormenyi (GCS) <g...@debian.org>
Changed-By: Laszlo Boszormenyi (GCS) <g...@debian.org>
Closes: 932401
Changes:
patch (2.7.6-5) unstable; urgency=high
.
* Fix CVE-2019-13636: mishandled following of symlinks (closes: #932401).
* Fix CVE-2019-13638: shell command injection.
Checksums-Sha1:
fb3e8123a6e811719de8f22cdb960e1bd5383a7a 1699 patch_2.7.6-5.dsc
8817614c12fd7bd41dff18f3f6b16d14b7053c1f 13348 patch_2.7.6-5.debian.tar.xz
Checksums-Sha256:
87b0b1814b84d8170359efb25f9c67e8e6c4e6dc38abc417328292165a8a447b 1699
patch_2.7.6-5.dsc
df316da8d48c848bebbfe4970a274ac5514eade0f0e8373f53a67899d459a80a 13348
patch_2.7.6-5.debian.tar.xz
Files:
73d7cc848f3b8f27b5e7ea7a56c96398 1699 vcs optional patch_2.7.6-5.dsc
6089cc5c78b5c4db143ebabe63143aaf 13348 vcs optional patch_2.7.6-5.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=NKWC
-----END PGP SIGNATURE-----
--- End Message ---