Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 26 Aug 1996 01:59:31 -0400 (EDT)
From:      Gene Stark <gene@starkhome.cs.sunysb.edu>
To:        imp@village.org
Cc:        security@freebsd.org
Subject:   Re: Vulnerability in the Xt library (fwd) 
Message-ID:  <199608260559.BAA13245@starkhome.cs.sunysb.edu>
In-Reply-To: <199608260358.VAA06773@rover.village.org> (message from Warner Losh on Sun, 25 Aug 1996 21:58:46 -0600)

next in thread | previous in thread | raw e-mail | index | archive | help
>: Calls to this new system call could then be introduced carefully into
>: existing software, right at the point where an exec that *has* to preserve
>: setuid privilege is performed.
>
>You'll have to be careful if you do this.  You'd need to make sure
>that you don't create something that the code inserted onto the stack
>can call and do an end run around the hard work you do in putting it

Of course, you're right, I didn't think this through properly.
However, this new system call could test to make sure that it is
being executed from the text segment, which is read-only, and refuse
to perform if not.
						- Gene Stark



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199608260559.BAA13245>