7.8
CVSSv3

CVE-2016-2779

Published: 07/02/2017 Updated: 04/01/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 644
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kernel util-linux 2.24.2-1

Vendor Advisories

Debian Bug report logs - #850702 CVE-2017-5226 -- bubblewrap escape Package: bubblewrap; Maintainer for bubblewrap is Utopia Maintenance Team <pkg-utopia-maintainers@listsaliothdebianorg>; Source for bubblewrap is src:bubblewrap (PTS, buildd, popcon) Reported by: up201407890@alunosdccfcuppt Date: Mon, 9 Jan 2017 13 ...
Debian Bug report logs - #838599 policycoreutils: CVE-2016-7545: SELinux sandbox escape via TIOCSTI ioctl Package: policycoreutils; Maintainer for policycoreutils is Debian SELinux maintainers <selinux-devel@listsaliothdebianorg>; Source for policycoreutils is src:policycoreutils (PTS, buildd, popcon) Reported by: up20140 ...
Debian Bug report logs - #815922 util-linux: CVE-2016-2779: runuser tty hijacking via TIOCSTI ioctl Package: util-linux; Maintainer for util-linux is LaMont Jones <lamont@debianorg>; Source for util-linux is src:util-linux (PTS, buildd, popcon) Reported by: up201407890@alunosdccfcuppt Date: Thu, 25 Feb 2016 18:54:02 U ...
Debian Bug report logs - #628843 login: tty hijacking possible in "su" via TIOCSTI ioctl Package: src:shadow; Maintainer for src:shadow is Shadow package maintainers <pkg-shadow-devel@listsaliothdebianorg>; Reported by: Daniel Ruoso <daniel@ruosocom> Date: Wed, 1 Jun 2011 19:27:02 UTC Severity: important Tags: c ...

Github Repositories

Yet Another Switch User

Yet Another? About Warning Usage From binary From Dockerfile Build Why? Alternatives su-exec chroot setpriv Others Contributing License Yet Another? This repository is a fork of tianon/gosu and renamed to avoid confusion as asked by the main maintainer See tianon/gosu#82 (comment) yasu because it's Yet Another Switch User The main purpose of this fork is to ha

Simple Go-based setuid+setgid+setgroups+exec

gosu This is a simple tool grown out of the simple fact that su and sudo have very strange and often annoying TTY and signal-forwarding behavior They're also somewhat complex to setup and use (especially in the case of sudo), which allows for a great deal of expressivity, but falls flat if all you need is "run this specific application as this specific user and get

Trivy setup using your CI tools

Setup Trivy in CI/CD tools Trivy is an image vulnerability scanner It detects vulnerabilties in OS packages and application dependencies Test trivy in MacOS Pull image: docker pull aquasec/trivy Scan your image: docker run --rm -v $HOME/Library/Caches:/root/cache/ aquasec/trivy [YOUR_IMAGE_NAME]

gosu This is a simple tool grown out of the simple fact that su and sudo have very strange and often annoying TTY and signal-forwarding behavior They're also somewhat complex to setup and use (especially in the case of sudo), which allows for a great deal of expressivity, but falls flat if all you need is "run this specific application as this specific user and get

gosu This is a simple tool grown out of the simple fact that su and sudo have very strange and often annoying TTY and signal-forwarding behavior They're also somewhat complex to setup and use (especially in the case of sudo), which allows for a great deal of expressivity, but falls flat if all you need is "run this specific application as this specific user and get

A small Python utility for wrapping some CNCF tools.

secpod_wrap Description A small Python utility for wrapping some CNCF tools At moment it wraps Trivy of Aqua Security, store on SQLite CVE of running pods, reports their owners (Jobs, StatefulSets, Deployments,) Usage Store on SQLite a vulnerability detection related to running pods export K8S_TOKEN="" export K8S_URL="1921685899:6443" /se

Trivy setup using your CI tools

Setup Trivy in CI/CD tools Trivy is an image vulnerability scanner It detects vulnerabilties in OS packages and application dependencies Test trivy in MacOS Pull image: docker pull aquasec/trivy Scan your image: docker run --rm -v $HOME/Library/Caches:/root/cache/ aquasec/trivy [YOUR_IMAGE_NAME]

gosu This is a simple tool grown out of the simple fact that su and sudo have very strange and often annoying TTY and signal-forwarding behavior They're also somewhat complex to setup and use (especially in the case of sudo), which allows for a great deal of expressivity, but falls flat if all you need is "run this specific application as this specific user and get

gosu This is a simple tool grown out of the simple fact that su and sudo have very strange and often annoying TTY and signal-forwarding behavior They're also somewhat complex to setup and use (especially in the case of sudo), which allows for a great deal of expressivity, but falls flat if all you need is "run this specific application as this specific user and get

run programs and scripts suid

Warning! See "Security" section at the end SUID Somewhat an inverse to sudo but with security first Usage git clone githubcom/hilbix/suidgit cd suid make sudo make install Afterwards you can run something as suid command args suid is inverse to sudo in the sense, that sudo