On Sun, 28 Jul 2002, Stas Sergeev wrote:

> Two attached patches implements that
> functionality. Then you can safely
> remove the "BUG" stuff I think.

Yes, that looks like the proper fix to me.

> Right, this is a main design problem
> of dosemu which is that the DPMI code
> is executed in the same address space
> with dosemu. vm86 is separated however.
> So DPMI code can do everything and if
> dosemu have root privs, it can be easily
> exploited by DPMI code.

yes, see section three of README.txt:

    * Never allow DPMI programms to run, when dosemu is suid root.
       (in /etc/dosemu.conf set 'dpmi off' to disable)
       It is possible to overwrite sensitive parts of the emulator code,
       and this makes it possible for a intruder program under DOS, who
       knows about dosemu internals (which is easy as you have the
       source) to get root access also on non dosemu processes. Because a
       lot of games won't work without, we allow creation of
       LDT-descriptor that span the whole user space.
       There is a 'secure' option in /etc/dosemu.conf, that allows to
       turn off creation of above mentioned descriptors, but those
       currently protect only the dosemu code and the stack, and may be
       some diabolical person finds a way to use the (unprotected) heap.
       Anyway, better 'secure on' than nothing.

> > Would you accept such a patch?

That would be me. Well together with Stas' patch I would accept it.

Bart

-
To unsubscribe from this list: send the line "unsubscribe linux-msdos" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to