Date: Fri, 27 Feb 1998 16:57:29 +1100 From: David Dawes <dawes@rf900.physics.usyd.edu.au> To: Mike Smith <mike@smith.net.au> Cc: Cy Schubert - ITSD Open Systems Group <cschuber@uumail.gov.bc.ca>, tqbf@secnet.com, freebsd-security@FreeBSD.ORG, security-officer@FreeBSD.ORG Subject: Re: OpenBSD Security Advisory: mmap() Problem Message-ID: <19980227165729.27270@rf900.physics.usyd.edu.au> In-Reply-To: <199802270543.VAA26437@dingo.cdrom.com>; from Mike Smith on Thu, Feb 26, 1998 at 09:43:49PM -0800 References: <199802270423.UAA01955@cwsys.cwsent.com> <199802270543.VAA26437@dingo.cdrom.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Feb 26, 1998 at 09:43:49PM -0800, Mike Smith wrote: >> I've ported this patch to FreeBSD 2.2.5R. XIG's Accelerated X server >> crashes trying to access the VT. To get the XIG Accelerated X server >> to work I've modified the patch to allow superuser to access to >> character devices. I'm not sure what other applications could break >> because of the originally posted patch or my modified patch, so >> additional study needs to be done. > >This modification effectively defeats much of the actual usefulness of >the patch. The bug is a second-order security risk in that an attacker >must already have obtained at least group kmem before she can take >advantage of it. I don't (at this point) think that we want to go >ahead with this until we hear from XIG. Does anyone know if it crashes an XFree86 server. XFree86 has a new release about to come out, and if there might be a problem here it would be good for us to know about it now. David To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19980227165729.27270>