summaryrefslogtreecommitdiffstats
path: root/sys/kern/kern_prot.c
diff options
context:
space:
mode:
authorsobomax <sobomax@FreeBSD.org>2005-02-11 14:02:42 +0000
committersobomax <sobomax@FreeBSD.org>2005-02-11 14:02:42 +0000
commiteeb5ed79cb8a683c86da9acb7bc01260fd172ea8 (patch)
treebcc44cb9ec85a9a91aedecdaf0083bfa8d083a77 /sys/kern/kern_prot.c
parent22b03e0f5d8293f08c9542b306e8df039546a47e (diff)
downloadFreeBSD-src-eeb5ed79cb8a683c86da9acb7bc01260fd172ea8.zip
FreeBSD-src-eeb5ed79cb8a683c86da9acb7bc01260fd172ea8.tar.gz
Add SIGTHR (32) into list of signals permitted to be delivered to the
suid application. The problem is that Linux applications using old Linux threads (pre-NPTL) use signal 32 (linux SIGRTMIN) for communication between thread-processes. If such an linux application is installed suid or sgid and security.bsd.conservative_signals=1 (default), then permission will be denied to send such a signal and the application will freeze. I believe the same will be true for native applications that use libthr, since libthr uses SIGTHR for implementing conditional variables. PR: 72922 Submitted by: Andriy Gapon <avg@icyb.net.ua> MFC after: 2 weeks
Diffstat (limited to 'sys/kern/kern_prot.c')
-rw-r--r--sys/kern/kern_prot.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/sys/kern/kern_prot.c b/sys/kern/kern_prot.c
index 38b9042..21f277f 100644
--- a/sys/kern/kern_prot.c
+++ b/sys/kern/kern_prot.c
@@ -1467,6 +1467,7 @@ cr_cansignal(struct ucred *cred, struct proc *proc, int signum)
case SIGHUP:
case SIGUSR1:
case SIGUSR2:
+ case SIGTHR:
/*
* Generally, permit job and terminal control
* signals.
OpenPOWER on IntegriCloud