Date: Mon, 26 Feb 2024 00:03:44 +0000 From: bugzilla-noreply@freebsd.org To: geom@FreeBSD.org Subject: [Bug 277228] Device permissions security hole with partitioning (/dev/geom.ctl) Message-ID: <bug-277228-14739-ZP1mis3tdp@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-277228-14739@https.bugs.freebsd.org/bugzilla/> References: <bug-277228-14739@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D277228 Kyle Evans <kevans@freebsd.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |kevans@freebsd.org --- Comment #3 from Kyle Evans <kevans@freebsd.org> --- The problem is one of the examples given: they can strip it easily enough today, but they want to, e.g., be able to allow a user to partition their U= SB flash drive but not internal media. Ultimately it'd be kind of nice if gpa= rt checked permissions on devfs nodes for the disks or something to that effec= t to allow finer access control, but that would seem to get hairy quickly. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-277228-14739-ZP1mis3tdp>