Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 13 Jun 2018 12:54:54 +0300
From: Georgi Guninski <guninski@...inski.com>
To: oss-security@...ts.openwall.com
Subject: Re: Are `su user' and/or `sudo -u user sh' considered
 dangerous?

On Wed, Jun 13, 2018 at 10:40:43AM +0300, Georgi Guninski wrote:
> Is there POC for relatively new distros?

debian 8 and 9 are vulnerable to su - hostile:
https://j.ludost.net/blog/archives/2018/06/13/ancient_su_-_hostile_vulnerability_in_debian_8_and_9/index.html

what about the second potential vulnerability: reading root's tty after
the session is closed with something like tee(1) ?

several sources suggest disabling TIOCSTI or using setsid(), are they
enough?

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.