BugTraq
The (in)security of Xorg and DRI Dec 14 2006 12:40AM
Darren Reed (avalon caligula anu edu au) (2 replies)

In recent discussion, the topic of the Xorg server being a huge
security vulnerability because of its DRI model has come up.

The problem being that you have user space code communicating
with chips in the system and being able to control DMA and what
goes which way on the system bus...

Does anyone have or know of any security exploits that take
advantage of this model and use it to bypass other security
enforcing perimeters? I'm imaging these to be dedicated
programs to run as root, not simple buffer overflows or
anything of that nature.

While this may not be of concern to the average Joe Bloggs at
home with his Linux desktop, if he were to be running a trusted
version of Linux with the same Xorg and DRI opening, the problem
is a tad different.

Cheers,
Darren

[ reply ]
Re: The (in)security of Xorg and DRI Dec 26 2006 11:20PM
Pavel Kankovsky (peak argo troja mff cuni cz)
Re: The (in)security of Xorg and DRI Dec 15 2006 02:44PM
Nicolas RUFF (nicolas ruff gmail com) (2 replies)
Re: The (in)security of Xorg and DRI Dec 18 2006 05:33AM
Darren Reed (avalon caligula anu edu au)
Re: The (in)security of Xorg and DRI Dec 17 2006 03:39PM
Darren Reed (avalon caligula anu edu au)


 

Privacy Statement
Copyright 2010, SecurityFocus