Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87oagvppdo.fsf@mid.deneb.enyo.de>
Date: Mon, 21 Sep 2015 21:02:27 +0200
From: Florian Weimer <fw@...eb.enyo.de>
To: oss-security@...ts.openwall.com
Subject: Re: s/party/hack like it's 1999

* Greg KH:

> On Mon, Sep 21, 2015 at 04:43:46PM +0000, David Holland wrote:
>> I have been arguing for years (but without success) that vt bomb
>> injection needs to be blocked in the tty driver. This problem
>> (corruption of concurrent UTF-8 streams) needs to be too, as a matter
>> of correctness and not even security.
>
> How exactly would a tty driver "block" anything like this?

Avoiding in-band signaling in the first place. :-/

> A tty driver never looks at the data stream in the kernel, as that
> way lies madness...

Surely there is a way to prevent two writes from interleaving?  For
writes to files in O_APPEND mode, this already happens, doesn't it?

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.