diff options
author | sobomax <sobomax@FreeBSD.org> | 2005-02-11 14:02:42 +0000 |
---|---|---|
committer | sobomax <sobomax@FreeBSD.org> | 2005-02-11 14:02:42 +0000 |
commit | eeb5ed79cb8a683c86da9acb7bc01260fd172ea8 (patch) | |
tree | bcc44cb9ec85a9a91aedecdaf0083bfa8d083a77 /sys/kern/kern_prot.c | |
parent | 22b03e0f5d8293f08c9542b306e8df039546a47e (diff) | |
download | FreeBSD-src-eeb5ed79cb8a683c86da9acb7bc01260fd172ea8.zip FreeBSD-src-eeb5ed79cb8a683c86da9acb7bc01260fd172ea8.tar.gz |
Add SIGTHR (32) into list of signals permitted to be delivered to the
suid application. The problem is that Linux applications using old Linux
threads (pre-NPTL) use signal 32 (linux SIGRTMIN) for communication between
thread-processes. If such an linux application is installed suid or sgid
and security.bsd.conservative_signals=1 (default), then permission will be
denied to send such a signal and the application will freeze.
I believe the same will be true for native applications that use libthr,
since libthr uses SIGTHR for implementing conditional variables.
PR: 72922
Submitted by: Andriy Gapon <avg@icyb.net.ua>
MFC after: 2 weeks
Diffstat (limited to 'sys/kern/kern_prot.c')
-rw-r--r-- | sys/kern/kern_prot.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/sys/kern/kern_prot.c b/sys/kern/kern_prot.c index 38b9042..21f277f 100644 --- a/sys/kern/kern_prot.c +++ b/sys/kern/kern_prot.c @@ -1467,6 +1467,7 @@ cr_cansignal(struct ucred *cred, struct proc *proc, int signum) case SIGHUP: case SIGUSR1: case SIGUSR2: + case SIGTHR: /* * Generally, permit job and terminal control * signals. |