Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 27 Feb 1998 14:31:26 -0800
From:      Mike Smith <mike@smith.net.au>
To:        Eivind Eklund <eivind@yes.no>
Cc:        Garrett Wollman <wollman@khavrinen.lcs.mit.edu>, Cy Schubert - ITSD Open Systems Group <cschuber@uumail.gov.bc.ca>, freebsd-security@FreeBSD.ORG
Subject:   Re: OpenBSD Security Advisory: mmap() Problem 
Message-ID:  <199802272231.OAA29161@dingo.cdrom.com>
In-Reply-To: Your message of "Fri, 27 Feb 1998 17:09:54 %2B0100." <19980227170953.30435@follo.net> 

next in thread | previous in thread | raw e-mail | index | archive | help

> On Fri, Feb 27, 1998 at 10:01:50AM -0500, Garrett Wollman wrote:
> > <<On Thu, 26 Feb 1998 20:23:06 -0800, Cy Schubert - ITSD Open Systems Group <cschuber@uumail.gov.bc.ca> said:
> > 
> > > crashes trying to access the VT.  To get the XIG Accelerated X server 
> > > to work I've modified the patch to allow superuser to access to 
> > > character devices.
> > 
> > The would be pointless.
> 
> It'd kill the securelevel facility, but it would still remove the kmem
> => root exploits.  But it isn't good enough, I agree.  Perhaps denying
> the transition only when !(root || securelevel > -1) would be a
> potential solution?  It'd allow AccelX to keep working (AFAIK, it
> won't work with securelevel > 0 anyway) and it would stop all real
> violations I can think of

The fundamental question still hasn't been answered; as Bruce asked, 
why are mmap operations on readonly character devices promoted to
readwrite in the first place?

-- 
\\  Sometimes you're ahead,       \\  Mike Smith
\\  sometimes you're behind.      \\  mike@smith.net.au
\\  The race is long, and in the  \\  msmith@freebsd.org
\\  end it's only with yourself.  \\  msmith@cdrom.com



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199802272231.OAA29161>