Debian Bug report logs -
#816320
coreutils: CVE-2016-2781: nonpriv session can escape to the parent session by using the TIOCSTI ioctl
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Michael Stone <mstone@debian.org>
:
Bug#816320
; Package src:coreutils
.
(Mon, 29 Feb 2016 19:48:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Michael Stone <mstone@debian.org>
.
(Mon, 29 Feb 2016 19:48:05 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: coreutils
Version: 8.13-1
Severity: important
Tags: security upstream
Hi,
the following vulnerability was published for coreutils.
CVE-2016-2781[0]:
|nonpriv session can escape to the parent session by using the TIOCSTI
| ioctl
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2016-2781
[1] https://bugzilla.redhat.com/show_bug.cgi?id=1312863
[2] http://seclists.org/oss-sec/2016/q1/452
Regards,
Salvatore
Information forwarded
to debian-bugs-dist@lists.debian.org, Michael Stone <mstone@debian.org>
:
Bug#816320
; Package src:coreutils
.
(Fri, 24 Jun 2016 09:27:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Petter Reinholdtsen <pere@hungry.com>
:
Extra info received and forwarded to list. Copy sent to Michael Stone <mstone@debian.org>
.
(Fri, 24 Jun 2016 09:27:03 GMT) (full text, mbox, link).
Message #10 received at 816320@bugs.debian.org (full text, mbox, reply):
[Salvatore Bonaccorso]
> the following vulnerability was published for coreutils.
>
> CVE-2016-2781[0]:
> |nonpriv session can escape to the parent session by using the TIOCSTI
> | ioctl
This seem to be a similar issue to
<URL: https://security-tracker.debian.org/tracker/CVE-2016-2568 > in pkexec,
which in its bug report #812512 mention a similar issue in su (CVE-2005-4890)
solved using setsid() and in sudo solved using the "use_pty" flag. Perhaps one
of these techniques might be usable here too?
I also found <URL: https://cxsecurity.com/issue/WLB-2012110063 > going into
details regarding su and vserver being hit by a similar problem.
--
Happy hacking
Petter Reinholdtsen
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Wed Jun 19 19:08:57 2019;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.