CVSROOT: /cvs
Module name: src
Changes by: [email protected] 2015/12/20 04:38:33
Modified files:
usr.bin/sndiod : Makefile listen.c miofile.c siofile.c sndiod.c
Added files:
usr.bin/sndiod : fdpass.c fdpass.h
Log message:
In case of a bug in sndiod, an attacker (a local user) could run
arbitrary code as user _sndio, i.e. get a second uid.
Mitigate the risk by implementing initial privilege separation as
follows. Break sndiod in two processes: a chroot()ed "worker" process
processing input, and a non-chroot()ed "helper" process opening
devices and passing descriptors to the worker.
With help from benno, claudio, semarie and gilles.
ok benno, semarie and tb