|
Message-ID: <20180613095453.GB1166@sivokote.iziade.m$> Date: Wed, 13 Jun 2018 12:54:54 +0300 From: Georgi Guninski <guninski@...inski.com> To: oss-security@...ts.openwall.com Subject: Re: Are `su user' and/or `sudo -u user sh' considered dangerous? On Wed, Jun 13, 2018 at 10:40:43AM +0300, Georgi Guninski wrote: > Is there POC for relatively new distros? debian 8 and 9 are vulnerable to su - hostile: https://j.ludost.net/blog/archives/2018/06/13/ancient_su_-_hostile_vulnerability_in_debian_8_and_9/index.html what about the second potential vulnerability: reading root's tty after the session is closed with something like tee(1) ? several sources suggest disabling TIOCSTI or using setsid(), are they enough?
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.