Your message dated Tue, 12 Jun 2018 20:43:56 +0000
with message-id <e1fsq8y-000azj...@fasolo.debian.org>
and subject line Bug#894993: fixed in patch 2.7.5-1+deb8u1
has caused the Debian Bug report #894993,
regarding patch: CVE-2018-1000156: input validation vulnerability when 
processing patch files
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
894993: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894993
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: patchutils
Version: 0.3.4-2
Severity: normal
Tags: security

As mentioned at https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667
and https://rachelbythebay.com/w/2018/04/05/bangpatch/, it's possible
for someone to create an ed diff that contains arbitrary commands, which
patch will then dutifully execute.  This behavior, which FreeBSD and
OpenBSD have issued security advisories for, is surprising and not
likely to be appreciated by users.

POSIX 1003.1-2008[0] restricts the valid commands in an ed diff to a, c,
d, i, and s.  patch should ensure any input it sends to ed contains only
those commands and abort if it does not.

[0] http://pubs.opengroup.org/onlinepubs/9699919799/utilities/diff.html

-- System Information:
Debian Release: buster/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable'), (500, 'stable'), (1, 
'experimental-debug'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.16.0-rc6-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages patchutils depends on:
ii  debianutils  4.8.4
ii  libc6        2.27-3
ii  patch        2.7.6-1
ii  perl         5.26.1-5

patchutils recommends no packages.

patchutils suggests no packages.

-- no debconf information

-- 
brian m. carlson: Houston, Texas, US
OpenPGP: https://keybase.io/bk2204

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: patch
Source-Version: 2.7.5-1+deb8u1

We believe that the bug you reported is fixed in the latest version of
patch, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 894...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Laszlo Boszormenyi (GCS) <g...@debian.org> (supplier of updated patch package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 16 Apr 2018 20:48:14 +0000
Source: patch
Binary: patch
Architecture: source amd64
Version: 2.7.5-1+deb8u1
Distribution: jessie
Urgency: medium
Maintainer: Laszlo Boszormenyi (GCS) <g...@debian.org>
Changed-By: Laszlo Boszormenyi (GCS) <g...@debian.org>
Description:
 patch      - Apply a diff file to an original
Closes: 894993
Changes:
 patch (2.7.5-1+deb8u1) jessie; urgency=medium
 .
   * Fix CVE-2018-1000156: arbitrary command execution in ed-style patches
       (closes: #894993).
Checksums-Sha1:
 954ea3a8c7b27197753a1cb792cb2a31b91c6943 1860 patch_2.7.5-1+deb8u1.dsc
 728fbaf17eb53ea67ac79568f44604a14607af44 10612 
patch_2.7.5-1+deb8u1.debian.tar.xz
 ec7b15aba558d48ec91225bce13cde00664f0baa 109460 patch_2.7.5-1+deb8u1_amd64.deb
Checksums-Sha256:
 5cf36254ba67fa20973387617c4d22c9ffb4774aab29cb80424344921a875c1f 1860 
patch_2.7.5-1+deb8u1.dsc
 4b0158c62f63e24b42d7bcfbd6f7268176f9b29b2150c0d3633234e82c3b0d20 10612 
patch_2.7.5-1+deb8u1.debian.tar.xz
 5272a26273fd799ec1ec74db0e01df5883abbdf8b7e343ad28227295f660c35d 109460 
patch_2.7.5-1+deb8u1_amd64.deb
Files:
 ca5b826b4b4659a1d4dc454ef72ae3d6 1860 vcs standard patch_2.7.5-1+deb8u1.dsc
 3476fe99dafd2b8432997eae12ac89d9 10612 vcs standard 
patch_2.7.5-1+deb8u1.debian.tar.xz
 a6f7056a5bbe6bc41f64882f07b7c787 109460 vcs standard 
patch_2.7.5-1+deb8u1_amd64.deb

-----BEGIN PGP SIGNATURE-----
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=3O+w
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to