From: Peter Hurley Date: Mon, 19 Jan 2015 18:05:03 +0000 (-0500) Subject: tty: Prevent untrappable signals from malicious program X-Git-Url: http://git.lede-project.org./?a=commitdiff_plain;h=37480a05685ed5b8e1b9bf5e5c53b5810258b149;p=openwrt%2Fstaging%2Fblogic.git tty: Prevent untrappable signals from malicious program Commit 26df6d13406d1a5 ("tty: Add EXTPROC support for LINEMODE") allows a process which has opened a pty master to send _any_ signal to the process group of the pty slave. Although potentially exploitable by a malicious program running a setuid program on a pty slave, it's unknown if this exploit currently exists. Limit to signals actually used. Cc: Theodore Ts'o Cc: Howard Chu Cc: One Thousand Gnomes Cc: Jiri Slaby Cc: # 2.6.36+ Signed-off-by: Peter Hurley Signed-off-by: Greg Kroah-Hartman --- diff --git a/drivers/tty/pty.c b/drivers/tty/pty.c index a9d256d6e909..6e1f1505f04e 100644 --- a/drivers/tty/pty.c +++ b/drivers/tty/pty.c @@ -210,6 +210,9 @@ static int pty_signal(struct tty_struct *tty, int sig) { struct pid *pgrp; + if (sig != SIGINT && sig != SIGQUIT && sig != SIGTSTP) + return -EINVAL; + if (tty->link) { pgrp = tty_get_pgrp(tty->link); if (pgrp)