[PATCH] Hal privilige seperation

Artem Kachitchkine Artem.Kachitchkin at Sun.COM
Fri Jan 20 16:43:59 PST 2006


> I was thinking the attack vector would be hald handling a D-BUS message
> in a way that would cause a buffer overflow thus allowing the
> unprivileged caller to execute code in the hal daemon. 

In the alternative I suggested, hald would also run unprivileged most of 
the time, except for a few lines of code that invoke a helper. But it 
would be susceptible to the attack you described, if malicious code 
executes seteuid(0). That's a fair concern and I'm happy with the patch 
as it is.

-Artem.


More information about the hal mailing list