Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <201106221419.p5MEJN5s009216@core.courtesan.com>
Date: Wed, 22 Jun 2011 10:19:23 -0400
From: "Todd C. Miller" <Todd.Miller@...rtesan.com>
To: Ludwig Nussel <ludwig.nussel@...e.de>
cc: oss-security@...ts.openwall.com,
        "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request -- coreutils -- tty hijacking possible in "su" via TIOCSTI ioctl

On Wed, 22 Jun 2011 15:41:09 +0200, Ludwig Nussel wrote:

> Newer sudo actually have a use_pty option that fixes the problem. 
> It's not enabled by default though.
> As I just found out there's also code missing to make sudo actually 
> honor the option in the config (patch attached, CC'd upstream).

Thanks for the patch, it will be part of sudo 1.8.2.

> Introducing similar code in su would be possible but requires some 
> programming effort. sudo has a liberal licence though so the code 
> could probably be reused.

The level of effort involved depends on whether or not you need job
control to work between the user's tty and the command running in
the pty.  Sudo proxies job control signals via an extra process so
that for, e.g. "sudo vi foo", the vi process be suspended by ^Z
even when it is running in a pty.  I don't think that people using
"su -c command" have the same expectations so it is probably not
worth the extra effort.

 - todd

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.