oss-security June 2011 archive
Main Archive Page > Month Archives  > oss-security archives
oss-security: Re: [oss-security] /bin/su (was: CVE request -- co

Re: [oss-security] /bin/su (was: CVE request -- coreutils -- tty hijacking possible in "su" via TIOCSTI ioctl)

From: Ludwig Nussel <ludwig.nussel_at_nospam>
Date: Wed Jun 15 2011 - 07:49:20 GMT
To: oss-security@lists.openwall.com

Bernhard Rosenkraenzer wrote:
> On Friday, June 10, 2011 11:55 CEST, Ludwig Nussel <ludwig.nussel@suse.de> wrote:
> > The issue also reminds me that there are several su implemenations.
> > On Fedora and SUSE we have a patched coreutils version, Debian uses
> > the one from shadow-utils and then there's also a su from
> > SimplePAMApps, used by e.g. Owl. Of course each one has it's own
> > quirks and weird features. Does anyone still remember why a
> > particular implementation was chosen? :-)
> In Ark Linux, we switched from the coreutils one to the shadow-utils one
> about 2 years ago because the shadow-utils one does what we need (incl. PAM
> support) without having to port the PAM patch on every new coreutils release.

Upstream coreutils indicated that they consider su in coreutils kind
of deprecated, basically only kept for legacy reasons on non-Linux
OSes. They would accept the PAM patch though so distros don't need
to maintain it.

Is there actually any serious distro that doesn't use PAM though?
Those #ifdefs to keep old shadow compatibility makes the code rather
ugly and hard to read. Maybe it's time to just rip out the old code
and submit a clean, PAM only su to util-linux.


-- (o_ Ludwig Nussel //\ V_/_ http://www.suse.de/ SUSE LINUX Products GmbH, GF: Jeff Hawn, Jennifer Guild, Felix Imendörffer, HRB 16746 (AG Nürnberg)