severity 663200 grave
thanks

On Fri, 10 May 2013, Tim Connors wrote:

> > I currently can't find any idea how to fix this issue.
> >
> > The security issue had to be solved by dropping the controlling
> > terminal, so you cannot start a command that would interact with the
> > current terminal. I don't have enough terminal handling skills to find
> > other way to fix the security issue than by dropping the terminal.
> >
> > An option could be to keep the controlling terminal when su-ing to root.
> > The issue would be less visible in sux (probably used mostly to gain
> > root privileges), but even if the risk when su'ing to root is lower, it
> > does not smell good.
>
> Is this just a security risk when suing from root to an unprivledged
> account (eg, in init.d scripts), and that unprivledged account injects
> keystrokes back into the root shell?  If it's not a risk when trying to
> get into the root account and running something with -c where you desire
> there to be a tty, then maybe you could keep the tty in that situation.
>
> Or what about providing an extra flag (eg, -C) where the user explicitly
> acknoledges that they're happy to take on the risk that you have a
> controlling tty and are executing a command with it?

Actually, the other thing you lose (I presuming caused by acting on bug
#628843) is tty resizing by SIGWINCH.  ttys are really useful, it turns
out.

I have shedloads of up-to-date security patched RHEL5/6 machines, and I've
never come across this problem on them.  Yep:
rhel6> su -c  -u root 'cat /dev/tty'
Password:
asdasda
asdasda
debian-wheezy> su -c  -u root 'cat /dev/tty'
Password:
cat: /dev/tty: No such device or address

Sorry, marking this bug as RC (pity I missed wheezy!), breaks other
software.

-- 
Tim Connors


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to