Date: Sat, 13 Jun 1998 23:03:30 -0700 (PDT) From: dima@best.net (Dima Ruban) To: avalon@coombs.anu.edu.au (Darren Reed) Cc: dima@best.net, jayrich@room101.sysc.com, security@FreeBSD.ORG Subject: Re: bsd securelevel patch question Message-ID: <199806140603.XAA25570@burka.rdy.com> In-Reply-To: <199806131219.FAA15482@flea.best.net> from Darren Reed at "Jun 13, 98 10:19:09 pm"
next in thread | previous in thread | raw e-mail | index | archive | help
Darren Reed writes:
> In some mail from Dima Ruban, sie said:
> >
> > Jay Richmond writes:
> > > Hello,
> > >
> > > Just wondering if we should expect an official patch for the securelevel
> > > problem that's affecting all the BSD's, or if the one provided in the
> > > recent exploit is being recommended?
> >
> > According to Thomas Ptacek, this is not exactly a bug, and after thinking some
> > more about it, I kinda agree with him. (Feature, not a bug)
>
> Given it is exploitable, whether or not it is a feature, is irrelevant.
> It permits the protection intended by securelevel over /dev/kmem to be
> bypassed, reducing the overall security of the system.
Hmm, this is not exactly bypassing a protection, you know.
Mainly because this protection is simply not targeted for this.
1 Secure mode - the system immutable and system append-only flags may
not be turned off; disks for mounted filesystems, /dev/mem, and
/dev/kmem may not be opened for writing.
(this is from man init)
I don't see exactly how it violates anything.
>
> Darren
>
-- dima
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199806140603.XAA25570>
