-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2019-14868 #13
Comments
@posguy99 Thanks for your feedback. We should obviously follow up on this. From my understanding this has been pushed by a Red Hat representative. Commitment by Apple, I hope, is just procedural. In all cases NIST should be informed and so should Apple Open Source that ksh2020 IS NOT an AT&T supported and amended version of their original works. As for the vulnerability itself, I would first want more evidence to qualify it as a vulnerability. The definition as initially filed at Red Hat by zsh developer Oliver Kiddle states:
The affirmation if an attacker is able to set specially crafted values needs to be demonstrated for the vulnerability to exist. IMO we are mixing two topics: a) local execution, and b) remote access. Interesting to see that the patched KSH2020 uses the test case below. if
|
Someone who's already installed the update checked for me and ksh is still calling itself 93u+. I don't have immediate access to a 10.15.5 installation. |
Well that's good news... you have the stable suff then :-) As for the possible vulnerability, further investigation needs to be done. |
Yeah, but given the reference, wtf patch did Apple apply? THAT patch won't apply to 93u+. That's what was my immediate concern because I didn't want to end up with a broken shell if I updated. |
I cannot speak for other vendors but the patches backported by Red Hat for older releases of ksh are publicly available. See for example: |
Thanks for the heads up @kdudka. Against which source code are the aforementioned patches applied? The specs file points to stale http://www.research.att.com URLs (but does reference the patch you mentioned). |
So this patch was added 7 days ago. And (at least by the filenames) seems to be applied to original AT&T tarballs and not against clones of GitHub's att/ast repository. To be confirmed. |
On Wednesday, May 27, 2020 5:17:39 PM CEST JM Marcastel wrote:
So this patch was added [7 days
ago](https://git.centos.org/rpms/ksh/c/859d0e11b5c270181c2f49e885b6c1924ab4
0915?branch=859d0e11b5c270181c2f49e885b6c1924ab40915).
It was just an example. You can find backported patches in other branches
where they were applied months ago:
https://git.centos.org/rpms/ksh/c/fe135eb6
And (at least by the filenames) seems to be applied to _original_ AT&T
tarballs and not against clones of GitHub's att/ast repository. To be
confirmed.
The source URL in the SPEC file was valid when we picked the tarball from
upstream. The server is obviously not under our control, so we cannot make
the URL valid forever. But you can still download the tarball from lookaside
cache if needed:
https://fedoraproject.org/wiki/Package_Source_Control#Lookaside_Cache
Kamil
|
@kdudka Thanks for the heads up. The lookaside cache is a neat feature. And the whole approach is pretty reassuring, especially for cases such as that of the AT&T KornShell :-) |
Here is what I think the problem might be (using ksh93 93u+):
The question is whether
Therefore ksh93v- does the same |
Apple just released macOS 10.15.5, and a secuity vuln they claim they fixed is this one. If you look at the CVE, it refers to a krader patch against what I think is ksh2020?
Apple's open source site ends at 10.15.3, so I can't see what they patched.
At 10.15.3, they were using 93u+.
Someone tell me, please, they haven't jumped tracks. I haven't installed the update yet, and don't really want to, but do want to, because it fixes a whale of a lot of security holes besides this one.
https://nvd.nist.gov/vuln/detail/CVE-2019-14868
https://support.apple.com/en-us/HT211170
att/ast@c7de8b6
The text was updated successfully, but these errors were encountered: