Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 06 Jan 2011 14:44:36 -0600
From: Raphael Geissert <geissert@...ian.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: patch directory traversal flaw

Vincent Danen wrote:
> We got a heads up on a directory traversal flaw in patch.  I don't think
> a CVE name has been assigned to it; could we get one?  It allows for the
> creation of arbitrary files in unexpected places due to the use of '..'.
> 
> References:
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=667529
> http://osdir.com/ml/bug-patch-gnu/2010-12/msg00000.html

Talking to Steve it looks like some things are not very clear, so I hope the 
following explains it:

* dpkg uses patch to apply patches in source packages format 1.0 and 3.0 
quilt (in spite of the name, dpkg uses an internal implementation of quilt)
* under the hood, patch is the one traversing directories when applying 
patches
* dpkg has its own set of checks for such traversals and general patch 
sanity checks. In fact, CVE-2010-0396 was also related to directory 
traversals.

CVE-2010-1679 is about dpkg being happy to pass patches with invalid paths 
to patch and following symlinks in the .pc directory.

That said, I don't know if quilt itself is affected by the .pc directory 
issue, and if it is, whether it is really relevant.

For further reference, DSA-2142-1 addresses the flaws in dpkg:
http://lists.debian.org/debian-security-announce/2011/msg00004.html


Cheers,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.