CVE-2016-2779

NameCVE-2016-2779
Descriptionrunuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh (attack range: local)
Debian Bugs815922

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
util-linux (PTS)wheezy2.20.1-5.3fixed
jessie2.25.2-6vulnerable
stretch2.29.2-1vulnerable
buster, sid2.30.2-0.1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
util-linuxsource(unstable)(unfixed)high815922
util-linuxsourcesqueeze(not affected)
util-linuxsourcewheezy(not affected)

Notes

[stretch] - util-linux <no-dsa> (Minor issue)
[jessie] - util-linux <no-dsa> (Minor issue)
[wheezy] - util-linux <not-affected> (runuser[.c] not yet present)
[squeeze] - util-linux <not-affected> (runuser[.c] not yet present)
Restricting ioctl on the kernel side seems the better approach, patches have been posted to kernel-hardening list
http://www.openwall.com/lists/oss-security/2016/02/27/1
https://marc.info/?l=util-linux-ng&m=145694736107128&w=2

Search for package or bug name: Reporting problems