lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <200612140040.kBE0exUX017795@caligula.anu.edu.au>
Date: Thu, 14 Dec 2006 11:40:59 +1100 (Australia/ACT)
From: Darren Reed <avalon@...igula.anu.edu.au>
To: bugtraq@...urityfocus.com
Subject: The (in)security of Xorg and DRI


In recent discussion, the topic of the Xorg server being a huge
security vulnerability because of its DRI model has come up.

The problem being that you have user space code communicating
with chips in the system and being able to control DMA and what
goes which way on the system bus...

Does anyone have or know of any security exploits that take
advantage of this model and use it to bypass other security
enforcing perimeters?  I'm imaging these to be dedicated
programs to run as root, not simple buffer overflows or
anything of that nature.

While this may not be of concern to the average Joe Bloggs at
home with his Linux desktop, if he were to be running a trusted
version of Linux with the same Xorg and DRI opening, the problem
is a tad different.

Cheers,
Darren

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ