Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 06 Dec 2006 18:09:46 +0000
From:      Craig Edwards <brain@winbot.co.uk>
To:        Dan Lukes <dan@obluda.cz>
Cc:        freebsd-security@freebsd.org, Colin Percival <cperciva@freebsd.org>
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-06:25.kmem
Message-ID:  <4577076A.6080508@winbot.co.uk>
In-Reply-To: <4576F3A9.9000307@obluda.cz>
References:  <200612060933.kB69XErN083086@freefall.freebsd.org>	<45769654.5050307@freebsd.org> <4576F3A9.9000307@obluda.cz>

next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Doesn't securelevel completely mitigate this even for root users anyway,
if set? Setting securelevel denies raw access to disk devices and kmem
in this way does it not?

- -- Craig Edwards

Dan Lukes wrote:
> Colin Percival napsal/wrote:
>>> A user in the "operator" group can read the contents of kernel memory.
>>> Such memory might contain sensitive information, such as portions of
>>> the file cache or terminal buffers.  This information might be directly
>>> useful, or it might be leveraged to obtain elevated privileges in some
>>> way; for example, a terminal buffer might include a user-entered
>>> password.

- --
OpenPGP Key ID: 0x49B959F7
"Better to reign in Hell than to serve in Heaven" -- Milton
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFFdwdqCd57Ikm5WfcRAmx9AKDCtIqEj5lREwepRoFfcnMJNGwixQCfQ3WI
c34CNp+R5Zsgl/PyE32Qr0c=
=lRB+
-----END PGP SIGNATURE-----



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4577076A.6080508>