,--[ On Monday 26 Nov 2007, Amarendra Godbole wrote:

[...]

| http://marc.info/?l=openbsd-misc&m=114233317926101

So, instead of letting 'Xorg' process decide which parts of memory is relevant 
with having access to complete memory via '/dev/mem', i.e. relying on its 
discretion, OpenBSD is having a kernel driver 'xf86' which only maps the 
graphics aperture, its PCI configuration space and VBE ROM to do 
mode-switching if required. So, if some malicious code is executing 
under 'Xorg' process, running in OS other than OpenBSD, it can play with OS 
data structures, kernel code, etc. present in the memory. Right.. ? This is 
cool example of security in OpenBSD. OpenBSD rocks :).

| -Amarendra
`--

Thanks
-- 
Ashish Shukla आशीष शुक्ल                      http://wahjava.wordpress.com/
·-- ·- ···· ·--- ·- ···- ·- ·--·-· --· -- ·- ·· ·-·· ·-·-·- -·-· --- --

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
bsd-india mailing list
[email protected]
http://www.bsd-india.org/mailman/listinfo/bsd-india

Reply via email to