CVE-2016-2779

runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
References
Link Resource
http://www.openwall.com/lists/oss-security/2016/02/27/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/02/27/2 Mailing List Third Party Advisory
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922 Issue Tracking Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/02/27/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/02/27/2 Mailing List Third Party Advisory
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:kernel:util-linux:2.24.2-1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:48

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2016/02/27/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/02/27/1 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/02/27/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/02/27/2 - Mailing List, Third Party Advisory
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922 - Issue Tracking, Third Party Advisory () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922 - Issue Tracking, Third Party Advisory

Information

Published : 2017-02-07 15:59

Updated : 2024-11-21 02:48


NVD link : CVE-2016-2779

Mitre link : CVE-2016-2779

CVE.ORG link : CVE-2016-2779


JSON object : View

Products Affected

kernel

  • util-linux
CWE
CWE-264

Permissions, Privileges, and Access Controls