|
From: | Paul Eggert |
Subject: | bug#24541: runcon tty hijacking via TIOCSTI ioctl |
Date: | Sun, 25 Sep 2016 11:49:40 -0700 |
User-agent: | Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.3.0 |
address@hidden wrote re <http://bugs.gnu.org/24541>:
When executing a program via the runcon utility, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to execute arbitrary commands without the SELinux security context.
Thanks for the bug report. Surely this is a bug in the setexeccon system call, not in the runcon command that uses the system call. That being said, perhaps runcon should work around the bug via something like the attached patch.
runcon.diff
Description: Text Data
[Prev in Thread] | Current Thread | [Next in Thread] |