Re: [sandbox] uid 0 <- Xorg <- Xephyr <- $program <- $exploit

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 08/19/2010 05:47 PM, Stephen Smalley wrote:
> It prevents the client application from directly communicating with the
> top-level Xorg server.  In the case of the bug you cited, they have to
> first escalate access and gain code execution within Xephyr before they
> can mount the attack on the top-level Xorg server, rather than being
> able to directly attack the top-level Xorg server from the client app.

I see. I thought Xephyr and the sandboxed program run within the same
domain, but looking at the process table made it clear.

The logical next question would be: How confined is xserver_t actually? ;)

> Curious as to whether they in fact wrote a successful exploit that did
> that, or just pointed out that it is theoretically possible.

I was also curious and asked on their blog, but didn't get a response.

thanks for your explanations,
Christoph


Attachment: signature.asc
Description: OpenPGP digital signature

--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux