Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 27 Feb 1998 17:09:54 +0100
From:      Eivind Eklund <eivind@yes.no>
To:        Garrett Wollman <wollman@khavrinen.lcs.mit.edu>, Cy Schubert - ITSD Open Systems Group <cschuber@uumail.gov.bc.ca>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: OpenBSD Security Advisory: mmap() Problem
Message-ID:  <19980227170953.30435@follo.net>
In-Reply-To: <199802271501.KAA04815@khavrinen.lcs.mit.edu>; from Garrett Wollman on Fri, Feb 27, 1998 at 10:01:50AM -0500
References:  <19980226174359.3210.qmail@joshua.enteract.com> <199802270423.UAA01955@cwsys.cwsent.com> <199802271501.KAA04815@khavrinen.lcs.mit.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Feb 27, 1998 at 10:01:50AM -0500, Garrett Wollman wrote:
> <<On Thu, 26 Feb 1998 20:23:06 -0800, Cy Schubert - ITSD Open Systems Group <cschuber@uumail.gov.bc.ca> said:
> 
> > crashes trying to access the VT.  To get the XIG Accelerated X server 
> > to work I've modified the patch to allow superuser to access to 
> > character devices.
> 
> The would be pointless.

It'd kill the securelevel facility, but it would still remove the kmem
=> root exploits.  But it isn't good enough, I agree.  Perhaps denying
the transition only when !(root || securelevel > -1) would be a
potential solution?  It'd allow AccelX to keep working (AFAIK, it
won't work with securelevel > 0 anyway) and it would stop all real
violations I can think of

1. root can't lower the securelevel
2. kmem can't get privileges it shouldn't have
3. root will get some privileges it could get some privileges it would
   have anyway if it had opened in another mode. This will make us
   vulnerable to the unlikely exploit of somebody getting hold of a
   root mmap() pointing at a character device, but _not_ being able to
   execute arbitary code.  Sounds unlikely to me.

Have I covered everything?  (Perhaps there are some special /dev/mem
interactions I don't know of...)

Eivind, who don't really like this solution, either, but if the
alternative is leaving the bug wide open...

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19980227170953.30435>