Package: bash
Version: 4.2+dfsg-0.1+deb7u3
Tags: security, patch
Severity: important

Hi

While fixing CVE-2016-7543 for wheezy I found that the upstream correction
was incomplete. It do in fact solve the problem described in the CVE but a
very closely related problem is not solved.

The problem described in the CVE is that it is possible to privilege
escalate to root.
However the patch only fix that specific problem, not escalation change to
any other user.

The attached patch solve that problem too.

Best regards

// Ola

-- 
 --- Inguza Technology AB --- MSc in Information Technology ----
/  o...@inguza.com                    Folkebogatan 26            \
|  o...@debian.org                   654 68 KARLSTAD            |
|  http://inguza.com/                Mobile: +46 (0)70-332 1551 |
\  gpg/f.p.: 7090 A92B 18FE 7994 0C36 4FE4 18A1 B1CF 0FE5 3DD9  /
 ---------------------------------------------------------------
--- a/bash/variables.c.orig	2016-10-23 20:50:41.850176398 +0000
+++ a/bash/variables.c	2016-10-23 20:51:39.185346623 +0000
@@ -467,10 +467,7 @@
       set_if_not ("PS2", secondary_prompt);
     }
 
-  if (current_user.euid == 0)
-    bind_variable ("PS4", "+ ", 0);
-  else
-    set_if_not ("PS4", "+ ");
+  bind_variable ("PS4", "+ ", 0);
 
   /* Don't allow IFS to be imported from the environment. */
   temp_var = bind_variable ("IFS", " \t\n", 0);

Reply via email to