X.Org security advisory: root hole via rogue hostname
X.Org security advisory: root hole via rogue hostname
Posted Apr 6, 2011 6:27 UTC (Wed) by wahern (subscriber, #37304)In reply to: X.Org security advisory: root hole via rogue hostname by acoopersmith
Parent article: X.Org security advisory: root hole via rogue hostname
But that only solves one of the two issues. You still need root to setuid(). But OpenSSH, for example, uses a multiple process model to isolate the privileged process; and it's the unprivileged process that does network I/O. Theoretically XDM could be setup similarly, so that only an unprivileged fork runs all the startup rc code and interacts with the environment, asking the privileged process to create a new user session when necessary. AFAIK the OpenBSD folks haven't hacked XDM to do this, but they use this multi-process model for all of their new services that require preservation of root credentials (excepting simple authentication, which is solved by BSDAuth).