fedora-selinux August 2010 archive
Main Archive Page > Month Archives  > fedora-selinux archives
fedora-selinux: [sandbox] uid 0 <- Xorg <- Xephyr <- $p

[sandbox] uid 0 <- Xorg <- Xephyr <- $program <- $exploit

From: Christoph A. <casmls_at_nospam>
Date: Thu Aug 19 2010 - 14:24:23 GMT
To: selinux@lists.fedoraproject.org


I assumed sandboxed application run within there own embedded X server
instance (Xephyr) to protect Xorg against attacks originating from the
sandbox. My assumption seams to be wrong as the recent security issue
showed [1].

[1] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2240

My question is: Why do sandboxed X application run within Xephyr?
Is the attack surface smaller if an application runs within Xephyr even
if Xephyr must be allowed to talk to Xorg?

kind regards,

-- selinux mailing list selinux@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/selinux