On Wed, 2005-08-03 at 15:14 -0400, Jon Smirl wrote:
> On 8/3/05, Eric Anholt <[EMAIL PROTECTED]> wrote:
> > 
> > These are the indirect ioctls, which allow the X Server to submit a
> > buffer of any commands it wants.  You could probably build a (or extend
> > the current) verifier for the all the things the X Server has done
> > through that ioctl, but that hasn't been done.
> 
> So there is probably a general security hole here if I can convice the
> Xserver to use the buffer addresses I want.

That would require a security hole in the X server. The attacker is root
already in that case.

> Who uses these? 

The current DDX drivers.

> They aren't used in the mesa tree.

So why did you change their requiring root?


-- 
Earthling Michel Dänzer      |     Debian (powerpc), X and DRI developer
Libre software enthusiast    |   http://svcs.affero.net/rm.php?r=daenzer



-------------------------------------------------------
SF.Net email is Sponsored by the Better Software Conference & EXPO
September 19-22, 2005 * San Francisco, CA * Development Lifecycle Practices
Agile & Plan-Driven Development * Managing Projects & Teams * Testing & QA
Security * Process Improvement & Measurement * http://www.sqe.com/bsce5sf
--
_______________________________________________
Dri-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/dri-devel

Reply via email to