Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 610664 - <sys-apps/util-linux-2.29.2: su: user can send SIGKILL with root privileges to other processes (CVE-2017-2616)
Summary: <sys-apps/util-linux-2.29.2: su: user can send SIGKILL with root privileges t...
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://www.kernel.org/pub/linux/util...
Whiteboard: ~3 [noglsa]
Keywords:
Depends on:
Blocks: CVE-2017-2616
  Show dependency tree
 
Reported: 2017-02-23 09:24 UTC by Hanno Böck
Modified: 2017-02-24 12:38 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Hanno Böck gentoo-dev 2017-02-23 09:24:52 UTC
See:
https://www.kernel.org/pub/linux/utils/util-linux/v2.29/v2.29.2-ReleaseNotes

  It is possible for any local user to send SIGKILL to other processes with root
  privileges.  To exploit this, the user must be able to perform su with a
  successful login.  SIGKILL can only be sent to processes which were executed
  after the su process.  It is not possible to send SIGKILL to processes which
  were already running.


2.29.2 fixes this.
Comment 1 Lars Wendler (Polynomial-C) (RETIRED) gentoo-dev 2017-02-23 09:33:05 UTC
# qfile -Cv $(which su)
sys-apps/shadow-4.4-r1 (/bin/su)


We are not using su from util-linux. So I doubt we are affected by this...
Comment 2 Hanno Böck gentoo-dev 2017-02-23 09:41:44 UTC
Thanks, wasn't aware of that. I'll ask on oss-security if anyone's aware whether the issue also affects the shadow version of su, but I doubt it, their code doesn't look similar.
Comment 3 SpanKY gentoo-dev 2017-02-23 18:32:38 UTC
yes, upstream contacted me before the release and i pointed out we've never used su from util-linux (or coreutils), and have never made it an option.
Comment 4 Hanno Böck gentoo-dev 2017-02-23 18:36:29 UTC
shadow's su is also affected:
https://github.com/shadow-maint/shadow/commit/08fd4b69e84364677a10e519ccb25b71710ee686


(appart from that on oss-security several people pointed out that debian is discussing moving from shadow's su to util-linux's - so it might be that the ecosystem wants to move to a single su implementation and gentoo might want to follow, but that's probably a separate discussion.)
Comment 5 Thomas Deutschmann (RETIRED) gentoo-dev 2017-02-24 12:20:27 UTC
Let's keep this bug report for sys-apps/util-linux so we can keep track that our util-linux package wasn't affected. I am going to create a tracker bug for CVE-2017-2616.
Comment 6 Thomas Deutschmann (RETIRED) gentoo-dev 2017-02-24 12:38:10 UTC
Closing this as invalid because Gentoo never used su from sys-apps/util-linux (see comment #3).