Date: Sun, 17 Feb 2002 22:16:38 -0800 (PST) From: Matthew Dillon <dillon@apollo.backplane.com> To: security@freebsd.org Subject: security bug / kernel tty buffer overflow Message-ID: <200202180616.g1I6Gc511474@apollo.backplane.com>
next in thread | raw e-mail | index | archive | help
Neelkanth Natu posted this message on hackers.
There are two places in kern/tty_pty.c that test ICANON against
tp->t_iflag instead of tp->t_lflag. I have comitted a fix to
-current with a 3-day MFC to -stable. This should probably go
into the security branch at some point.
-Matt
Matthew Dillon
<dillon@backplane.com>
:From: Neelkanth Natu <neelnatu@yahoo.com>
:Subject: bug in ptcwrite()
:To: freebsd-hackers@FreeBSD.ORG
:Date: Sun, 17 Feb 2002 13:52:40 -0800 (PST)
:
:Hi,
:
:The following code in ptcwrite() in kern/tty_pty.c is supposed to prevent
:the tty input buffer overflow (for certain cases):
:
: 612 if ((tp->t_rawq.c_cc + tp->t_canq.c_cc) >= TTYHOG - 2 &&
: 613 (tp->t_canq.c_cc > 0 || !(tp->t_iflag&ICANON))) {
: 614 wakeup(TSA_HUP_OR_INPUT(tp));
: 615 goto block;
: 616 }
:
:But the ICANON flag is set in tp->t_lflag and not tp->t_iflag. The ICRNL flag
:in tp->t_iflag has the same value as the ICANON flag in tp->t_lflag (0x100).
:This leads to input buffer overflow as soon as the ICRNL bit is set in
:tp->t_iflag, and there are more than 1024 characters that telnet/ssh wants
:to write to the pty.
:
:I discovered this problem when using libreadline because it changes the
:terminal settings every time it is begins/finishes reading a line.
:
:Has anyone else seen a similar problem ? I saw identical behavior on NetBSD
:too. Please CC me as I am not on the mailing list.
:
:thanks
:Neel
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200202180616.g1I6Gc511474>
