Hello.

This is due to changes introduced in su in shadow 4.1.5 to address
CVE-2005-4890. They amount, in sum, to dropping the controlling TTY
when su is used non-interactively.

While the threat of command injection does exist, shadow's omni
directional solution is overkill. 

As I documented back in May (http://seclists.org/oss-
sec/2013/q2/374),
crippling "su -c" when escalating privileges (i.e. callee is root)
is unwarranted. After all, we're not really worried about root
injecting commands to a non-privileged user.

Feel free to use the patch I constructed that addresses the issue
being reported when sux (or any other su frontend/wrapper) invokes
su non-interactively to escalate privs: 

http://sf.net/projects/mancha/files/misc/shadow-4.1.5.1_CVE-2005-
4890_relax.diff

This patch makes sure the controlling terminal isn't dropped when
the callee is root while still protecting from command injection
from an unprivileged tty to a privileged one.

--mancha


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to