Re: kernel allows loadkeys to be used by any user, allowing for local root compromise

From: Rudolf Polzer
Date: Wed Oct 19 2005 - 08:47:44 EST


Scripsis, quam aut quem »Krzysztof Halasa« appellare soleo:
> Rudolf Polzer <debian-ne@xxxxxxxxxxxx> writes:
> > However, pool computers like in this case are neither servers nor
> > terminals. If they were terminals, we would need about 30 servers to
> > handle the load of 100 active students. So they are workstation
> > installations that do most of the work locally.
>
> Ok. So they are exposed to known attacks with quite high probability.

Which others? Are there other places that assume only trusted users can access
the console?

> >> Hope they don't change the keys in the process.
> >
> > They HAVE to do that,
>
> Well, I meant physical keys to match them to loaded keymaps :-)

;)

> > However, Xorg and XFree86 have about the same problem: you can remap
> > Ctrl-Alt-Backspace. So it would be good if the SAK also worked there which
> > would require it to set a "sane" video mode.
>
> I assume that one can notice that Ctrl-Alt-Backspace doesn't work,
> and stop there.

Not if a malicious X program does "chvt 1; chvt 7" when Ctrl-Alt-Backspace is
pressed.

> I think SAK/X11 video mode issue is possible to fix, though.

It would require a video driver that can actually reset the video mode.
Framebuffer drivers usually can do that. For the standard VGA text mode, at
least savetextmode/restoretextmode from svgalib don't work on the graphics
cards I have.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/