|
Message-ID: <20230314103626.3ucbt2rjdfhjbe6t@jwilk.net>
Date: Tue, 14 Mar 2023 11:36:26 +0100
From: Jakub Wilk <jwilk@...lk.net>
To: <oss-security@...ts.openwall.com>
Subject: Re: TTY pushback vulnerabilities / TIOCSTI
* Hanno Böck <hanno@...eck.de>, 2023-03-14 09:51:
>In the 2017 post solar designer mentioned that the Linux kernel
>developers have multiple times rejected changes in the kernel.
I believe this is the post in question:
https://www.openwall.com/lists/oss-security/2017/06/03/9
>Starting with Kernel 6.2 it is possible to disable TIOCSTI (unset
>CONFIG_LEGACY_TIOCSTI).
Nice, but...
On Linux virtual terminals, it's possible to achieve pretty much the
same effect using TIOCLINUX, the ioctl used by gpm to implement
copy&pasting.
I've attached a minimal PoC. A more elaborate one is here:
https://github.com/jwilk/ttyjack
--
Jakub Wilk
View attachment "minittyjack.c" of type "text/x-csrc" (584 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.