On Wed, Aug 02, 2006 at 10:35:20AM -0700, Jim Carter wrote:
> untrustedProg cannot use legitimate means to induce UML1's kernel to map 
> kernel memory (except according to the UNIX file permissions of /dev/kmem).

And whether /dev/kmem allows writing.  This has been controversial in
the past (and I vaguely recall it being (at least optionally)
disabled).  Currently, it is writable, but open is under the control
of CAP_SYS_RAWIO, so removing that from the capabilities received by
init will remove from the system the ability to write kmem.

In this case, UML (in the absence of exploitable UML bugs) is safe
against the root user.

                                Jeff

-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys -- and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
User-mode-linux-user mailing list
User-mode-linux-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/user-mode-linux-user

Reply via email to