Hi Samuel, On 2023-08-02 at 22:30:21 (+0200), Samuel Thibault <[email protected]> wrote: > Hello, > Samuel Thibault, le jeu. 20 juil. 2023 19:28:37 +0200, a ecrit: >> Samuel Thibault, le dim. 16 juil. 2023 23:33:02 +0200, a ecrit: >> > Dave Mielke, le dim. 16 juil. 2023 12:10:39 -0400, a ecrit: >> > > [quoted lines by Nicolas Pitre on 2023/07/16 at 00:33 -0400] >> > > >> > > >Best would be to fix the kernel. >> > > >> > > That's happening. My understanding is that, in the 6.4 kernel, Samuel >> > > has an accepted patch which ignores the sysctl setting if the process >> > > has CAP_SYS_ADMIN (which brltty does if invoked properly). >> > >> > It is not commited yet, but it was acked by two maintainers, so there's >> > good hopes that it will be commited for 6.5, and backported to the >> > affected stable kernels. >> >> It entered greg kh's tty-linus tree, in time for 6.5-rc3 or 6.5-rc4. > > It got into 6.5-rc4 indeed.
Thank you very much, indeed, for taking care of this. I really appreciate that you saw this problem coming early on and have worked on a solution so persistently and successfully! Just out of curiosity: Would it not make sense for the kernel to clear the input buffer whenever it switches to a context with increased privileges? If I understand correctly, the sudo exploit would not work in such a scenario. Since I am not well acquainted with the relevant kernel subsystems, I may well miss potential side effects that would be undesirable. So, would do you think about that approach? Thanks again and best wishes, Elias _______________________________________________ This message was sent via the BRLTTY mailing list. To post a message, send an e-mail to: [email protected] For general information, go to: http://brltty.app/mailman/listinfo/brltty
