Re: Fixing su + runuser vulnerability CVE-2016-2779

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, Oct 02, 2016 at 03:16:00PM +0200, Florian Weimer wrote:
> * Karel Zak:
> 
> > I have applied patch based on libseccomp syscall filter:
> >
> >    https://github.com/karelzak/util-linux/commit/8e4925016875c6a4f2ab4f833ba66f0fc57396a2
> >
> > it works as expected, but IMHO it's workaround for our stupid kernel...
> 
> How does this work?
> 
> Isn't it possible to pass the descriptor to another, unrestricted
> process (perhaps spawned from cron) and then run the ioctl from there?

 Good point, I don't know. The question is how secure is TIOCSTI
 itself, does it work for arbitrary another process which without
 any relation to the original tty processes?

 The ioctl should be fired in the hell... :-)

    Karel

-- 
 Karel Zak  <kzak@xxxxxxxxxx>
 http://karelzak.blogspot.com
--
To unsubscribe from this list: send the line "unsubscribe util-linux" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Netdev]     [Ethernet Bridging]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux