Closed GoogleCodeExporter closed 9 years ago
Original comment by ianb...@google.com
on 23 Jun 2014 at 11:36
Original comment by ianb...@google.com
on 22 Aug 2014 at 9:38
Deadline exceeded - automatically derestricting
I wonder if this affects iOS / iPhone? An escalation of this nature might have
some impact on iOS (even if it does not on OS X)
Original comment by cev...@google.com
on 30 Sep 2014 at 6:09
This doesn't really seem like a vulnerability to me. More of a silly bug. In
any event, looks like it is fixed in Yosemite.
Original comment by jerem...@gmail.com
on 31 Dec 2014 at 10:29
You are correct that this was fixed in Yosemite - I hadn't updated this bug as
I didn't receive a direct reply to the report email but I'll update the labels
now to reflect this.
The root requirement does make the severity of this issue more complex;
remember though that OS X does have many services which are both within a
sandbox *and* run as root. For example blued is one such service responsible
for interaction with the bluetooth stack. Whilst there are known public
workarounds to bypass kernel code signing as root (for example by using the
AppleHWAccess user client) these may not work from a sandboxed root processes.
It was also possible that this particular IOKit class was used in iOS - at the
time however I had no iOS setup to test that.
Original comment by ianb...@google.com
on 1 Jan 2015 at 12:29
Original issue reported on code.google.com by
ianb...@google.com
on 23 Jun 2014 at 11:25Attachments: