APPLIED[U]: [Unstable 0/1] LP: #2046192
Andrea Righi
andrea.righi at canonical.com
Tue Jan 2 10:46:46 UTC 2024
On Mon, Dec 11, 2023 at 05:54:42PM -0300, Thadeu Lima de Souza Cascardo wrote:
> BugLink: https://bugs.launchpad.net/bugs/2046192
>
> Disable CONFIG_LEGACY_TIOCSTI.
>
> [Impact]
> From the config option description:
> Historically the kernel has allowed TIOCSTI, which will push
> characters into a controlling TTY. This continues to be used
> as a malicious privilege escalation mechanism, and provides no
> meaningful real-world utility any more. Its use is considered
> a dangerous legacy operation, and can be disabled on most
> systems.
>
> [Test case]
> Test that TIOCSTI is not allowed by unprivileged user, while still allowed by CAP_SYS_ADMIN.
>
> [Potential regression]
> Programs relying on TIOCSTI may break.
Applied to noble/linux-unstable, thanks!
-Andrea
>
> Thadeu Lima de Souza Cascardo (1):
> UBUNTU: [Config]: disable CONFIG_LEGACY_TIOCSTI
>
> debian.master/config/annotations | 4 +++-
> 1 file changed, 3 insertions(+), 1 deletion(-)
>
> --
> 2.34.1
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
More information about the kernel-team
mailing list