Bug#334113: [Secure-testing-team] Re: kernel allows loadkeys to be used by any user, allowing for local root compromise
- To: debian-kernel@lists.debian.org
- Cc: Horms <horms@verge.net.au>, security@kernel.org, team@security.debian.org, 334113@bugs.debian.org, linux-kernel@vger.kernel.org, Rudolf Polzer <debian-ne@durchnull.de>, Alastair McKinstry <mckinstry@debian.org>, secure-testing-team@lists.alioth.debian.org
- Subject: Bug#334113: [Secure-testing-team] Re: kernel allows loadkeys to be used by any user, allowing for local root compromise
- From: Anthony DeRobertis <anthony@derobert.net>
- Date: Wed, 19 Oct 2005 00:14:10 -0400
- Message-id: <[🔎] 4355C812.80103@derobert.net>
- Reply-to: Anthony DeRobertis <anthony@derobert.net>, 334113@bugs.debian.org
- In-reply-to: <[🔎] m37jcakhsm.fsf@defiant.localdomain>
- References: <[🔎] E1EQofT-0001WP-00@master.debian.org> <[🔎] 20051018044146.GF23462@verge.net.au> <[🔎] m37jcakhsm.fsf@defiant.localdomain>
Krzysztof Halasa wrote:
> Why doesn't the intruder just simulate login process (printing "login: "
> and "Password:")? That's known and used for ages.
Well, you can configure a single vty to only allow logins from admins.
Then you avoid the fake login problem, but not the loadkeys problem
(since that affects all vtys)
Reply to: