Date: Tue, 14 Mar 2023 11:36:26 +0100 From: Jakub Wilk <jwilk@...lk.net> To: <oss-security@...ts.openwall.com> Subject: Re: TTY pushback vulnerabilities / TIOCSTI * Hanno Böck <hanno@...eck.de>, 2023-03-14 09:51: >In the 2017 post solar designer mentioned that the Linux kernel >developers have multiple times rejected changes in the kernel. I believe this is the post in question: https://www.openwall.com/lists/oss-security/2017/06/03/9 >Starting with Kernel 6.2 it is possible to disable TIOCSTI (unset >CONFIG_LEGACY_TIOCSTI). Nice, but... On Linux virtual terminals, it's possible to achieve pretty much the same effect using TIOCLINUX, the ioctl used by gpm to implement copy&pasting. I've attached a minimal PoC. A more elaborate one is here: https://github.com/jwilk/ttyjack -- Jakub Wilk View attachment "minittyjack.c" of type "text/x-csrc" (584 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.