Dear supervisors,

I would like to pledge for an update of the package

    rush_1.7+dfsg-1

within the stable release. The cause is CVE-2013-6889:

   http://bugs.debian.org/733505

The matter concerns file access elevation due to SUID-bit
when running the software in test mode.

The issue has been resolved and uploaded to unstable by

    rush_1.7+dfsg-4

and I propose the identical patching for the package kept
in the stable release. The upstream project has incorporated
my patch verbatim in its repository.

Best regards,

  Mats Erik Andersson, maintainer of GNU Rush
diff -Nru rush-1.7+dfsg/debian/changelog rush-1.7+dfsg/debian/changelog
--- rush-1.7+dfsg/debian/changelog	2011-07-06 17:48:31.000000000 +0200
+++ rush-1.7+dfsg/debian/changelog	2014-01-24 13:15:27.000000000 +0100
@@ -1,3 +1,10 @@
+rush (1.7+dfsg-1+deb7u1) stable-security; urgency=high
+
+  * Attend to CVE-2013-6889, file access escalation.
+    + debian/patches/cve_2013_6889.diff: New file.
+
+ -- Mats Erik Andersson <mats.anders...@gisladisker.se>  Fri, 24 Jan 2014 13:13:09 +0100
+
 rush (1.7+dfsg-1) unstable; urgency=low
 
   * Initial release. (Closes: #515198)
diff -Nru rush-1.7+dfsg/debian/patches/cve_2013_6889.diff rush-1.7+dfsg/debian/patches/cve_2013_6889.diff
--- rush-1.7+dfsg/debian/patches/cve_2013_6889.diff	1970-01-01 01:00:00.000000000 +0100
+++ rush-1.7+dfsg/debian/patches/cve_2013_6889.diff	2014-01-19 16:42:45.000000000 +0100
@@ -0,0 +1,27 @@
+Description: CVE-2013-6889, elevated access.
+ The executable will, when used with SUID-bit set,
+ allow opening and reading access to every system
+ file also by an unprivileged user, whenever invocation
+ is done in testing mode, i.e., using '-t' without '-u'.
+ .
+ Prevent this mistake by resetting the effective user
+ identification to the real user identification when-
+ ever testing mode is asked for.
+Author: Mats Erik Andersson <deb...@gisladisker.se>
+Forwarded: yes
+Bug-Debian: http://bugs.debian.org/733505
+Last-update: 2014-01-16
+
+--- rush-1.7+dfsg.debian/src/rush.c
++++ rush-1.7+dfsg/src/rush.c
+@@ -913,6 +913,10 @@ main(int argc, char **argv)
+ 	} else if (argc > optind)
+ 		die(usage_error, NULL, _("invalid command line"));
+ 	
++	/* Step down from SUID when running in test mode.  */
++	if (lint_option)
++		setuid(getuid());
++
+ 	if (test_user_name) {
+ 		struct passwd *pw = getpwnam(test_user_name);
+ 		if (!pw)
diff -Nru rush-1.7+dfsg/debian/patches/series rush-1.7+dfsg/debian/patches/series
--- rush-1.7+dfsg/debian/patches/series	2011-04-18 14:07:15.000000000 +0200
+++ rush-1.7+dfsg/debian/patches/series	2014-01-24 13:12:34.000000000 +0100
@@ -1,2 +1,3 @@
 dfsg_reduction.diff
 tcpmux_service.diff
+cve_2013_6889.diff

Reply via email to