Skip to content

Commit bdea5f0

Browse files
Systemd Insecure PTY Handling Vulnerability
1 parent 4d3b74d commit bdea5f0

File tree

1 file changed

+1
-2
lines changed

1 file changed

+1
-2
lines changed

systemd-run-tty.txt

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -211,7 +211,6 @@ uid=1000(fantastic) gid=1000(fantastic) groups=1000(fantastic),90(network),96(sc
211211
./ptypwn /dev/pts/3
212212
./ptypwn /dev/pts/3
213213

214-
215214
/* ptypwn.c - use TIOCSTI ioctl to inject commands into user-owned pty */
216215
#include <fcntl.h>
217216
#include <stdio.h>
@@ -239,7 +238,7 @@ int main(int argc, char *argv[]) {
239238
return 0;
240239
}
241240

242-
Additionally systemd-run supports a "--pipe" operation which will simply connect the privielged
241+
Additionally systemd-run supports a "--pipe" operation which will simply connect the privileged
243242
process to the same-user parent tty directly, this option should be removed entirely as it offers
244243
no protection against the attacks outlined above.
245244

0 commit comments

Comments
 (0)