,--[ On Monday 26 Nov 2007, Amarendra Godbole wrote: [...]
| http://marc.info/?l=openbsd-misc&m=114233317926101 So, instead of letting 'Xorg' process decide which parts of memory is relevant with having access to complete memory via '/dev/mem', i.e. relying on its discretion, OpenBSD is having a kernel driver 'xf86' which only maps the graphics aperture, its PCI configuration space and VBE ROM to do mode-switching if required. So, if some malicious code is executing under 'Xorg' process, running in OS other than OpenBSD, it can play with OS data structures, kernel code, etc. present in the memory. Right.. ? This is cool example of security in OpenBSD. OpenBSD rocks :). | -Amarendra `-- Thanks -- Ashish Shukla आशीष शुक्ल http://wahjava.wordpress.com/ ·-- ·- ···· ·--- ·- ···- ·- ·--·-· --· -- ·- ·· ·-·· ·-·-·- -·-· --- --
signature.asc
Description: This is a digitally signed message part.
_______________________________________________ bsd-india mailing list [email protected] http://www.bsd-india.org/mailman/listinfo/bsd-india
