30.05.2012 05:33, Bart Oldeman wrote:
>> What do you think about the MMAP_PAGE_ZERO personality
>> instead?
> It looks blocked (try setarch -Z dosemu.bin), otherwise it would be
> too easy to bypass :)
Hmm? Works perfectly for me, but doesn't do the trick
unless mmap_min_addr is set to zero or you are a root...
And root is allowed to bypass mmap_min_addr even without
setarch, so nothing new. Sigh.

> program exploiting a kernel bug. Perhaps it would be possible to allow
> trusted users access but we already have a mechanism for that (sudo
> with dosemu -s).
Just wondering, are you sure it really works?
Root can bypass mmap_min_addr, yes, but dosemu -s drops root
soon, so are you sure everything will work in dosemu -s case?
I guess you'd need some prctl to allow changing the mmap addr
only for the calling process, and since there is none, I wonder
how does that work right now. But if it does - great.

> Allowing page zero mmaps while protecting the kernel can technically be done
> http://www.mail-archive.com/fedora-devel-list@redhat.com/msg10435.html
> but I'm not sure if it would get ugly (IRQ handlers would need to
> protect the zero page on every entry and unprotect on exit, if
> necessary).
I certainly think the kernel have to deal with its bugs on its
own, without offloading its headaches into userspace...

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Dosemu-devel mailing list
Dosemu-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/dosemu-devel

Reply via email to