Date: Wed, 24 Feb 2016 13:58:57 -0700 From: Eric Blake <eblake@...hat.com> To: oss-security@...ts.openwall.com Subject: Re: CVE Request: bash-completion: dequote command injection On 02/24/2016 12:08 PM, Fernando Muñoz wrote: > Marcelo Echeverria and Fernando Muñoz discovered that the dequote > function included in bash-completion allows to execute arbitrary > commands since it uses the eval function to call printf and perform > the actual dequoting. bash-completion is included on Debian, Ubuntu > OpenSuse  and probably other distros. But what is the privilege escalation? This is no different than incorrectly using 'eval' in a shell script - you may have buggy code, and have an easy-to-trigger bug, but if you can't escalate privileges, how it is a CVE? -- Eric Blake eblake redhat com +1-919-301-3266 Libvirt virtualization library http://libvirt.org Download attachment "signature.asc" of type "application/pgp-signature" (605 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.