Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 31 Jul 2010 15:41:36 +0300
From:      Kostik Belousov <kostikbel@gmail.com>
To:        Selphie Keller <selphie.keller@gmail.com>
Cc:        freebsd-security@freebsd.org
Subject:   Re: kernel module for chmod restrictions while in securelevel one or higher
Message-ID:  <20100731124136.GN22295@deviant.kiev.zoral.com.ua>
In-Reply-To: <235BB726E71747BA980A0EF60F76ED37@2WIRE304>
References:  <235BB726E71747BA980A0EF60F76ED37@2WIRE304>

next in thread | previous in thread | raw e-mail | index | archive | help

--9j9z4uig7ElIUlwi
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Fri, Jul 30, 2010 at 11:18:39PM -0700, Selphie Keller wrote:
> Kernel module for chmod restrictions while in securelevel one or higher:
> http://gist.github.com/501800 (fbsd 8.x)
>=20
> Was looking at the new recent sendfile/mbuf exploit and it was using a
> shellcode that calls chmod syscall to make a setuid/setgid binary. However
Can you point to the exploit (code) ?

--9j9z4uig7ElIUlwi
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (FreeBSD)

iEYEARECAAYFAkxUGgAACgkQC3+MBN1Mb4j7XgCeN3eeGinQ28eRSz/KRXPcL/uW
E0sAoOyFDWeOQasKxsr8aMgjahuKr7iP
=fWxs
-----END PGP SIGNATURE-----

--9j9z4uig7ElIUlwi--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20100731124136.GN22295>