Mandriva Linux Security Advisory : patch (MDVSA-2015:138)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing a security update.

Description :

Updated patch package fixes security vulnerabilities :

It was reported that a crafted diff file can make patch eat memory and
later segfault (CVE-2014-9637).

It was reported that the versions of the patch utility that support
Git-style patches are vulnerable to a directory traversal flaw. This
could allow an attacker to overwrite arbitrary files by applying a
specially crafted patch, with the privileges of the user running patch
(CVE-2015-1395).

GNU patch before 2.7.4 allows remote attackers to write to arbitrary
files via a symlink attack in a patch file (CVE-2015-1196).

See also :

http://advisories.mageia.org/MGASA-2015-0068.html

Solution :

Update the affected patch package.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 82391 ()

Bugtraq ID:

CVE ID: CVE-2014-9637
CVE-2015-1196
CVE-2015-1395

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now