On Wed, 2005-08-03 at 15:14 -0400, Jon Smirl wrote: > On 8/3/05, Eric Anholt <[EMAIL PROTECTED]> wrote: > > > > These are the indirect ioctls, which allow the X Server to submit a > > buffer of any commands it wants. You could probably build a (or extend > > the current) verifier for the all the things the X Server has done > > through that ioctl, but that hasn't been done. > > So there is probably a general security hole here if I can convice the > Xserver to use the buffer addresses I want.
That would require a security hole in the X server. The attacker is root already in that case. > Who uses these? The current DDX drivers. > They aren't used in the mesa tree. So why did you change their requiring root? -- Earthling Michel Dänzer | Debian (powerpc), X and DRI developer Libre software enthusiast | http://svcs.affero.net/rm.php?r=daenzer ------------------------------------------------------- SF.Net email is Sponsored by the Better Software Conference & EXPO September 19-22, 2005 * San Francisco, CA * Development Lifecycle Practices Agile & Plan-Driven Development * Managing Projects & Teams * Testing & QA Security * Process Improvement & Measurement * http://www.sqe.com/bsce5sf -- _______________________________________________ Dri-devel mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/dri-devel
