Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 2 Oct 2009 17:48:51 +0000 (UTC)
From:      "Bjoern A. Zeeb" <bz@FreeBSD.org>
To:        cvs-src-old@freebsd.org
Subject:   cvs commit: src/sys/kern init_main.c kern_exec.c
Message-ID:  <200910021749.n92Hn7aX056068@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
bz          2009-10-02 17:48:51 UTC

  FreeBSD src repository

  Modified files:
    sys/kern             init_main.c kern_exec.c 
  Log:
  SVN rev 197711 on 2009-10-02 17:48:51Z by bz
  
  Add a mitigation feature that will prevent user mappings at
  virtual address 0, limiting the ability to convert a kernel
  NULL pointer dereference into a privilege escalation attack.
  
  If the sysctl is set to 0 a newly started process will not be able
  to map anything in the address range of the first page (0 to PAGE_SIZE).
  This is the default. Already running processes are not affected by this.
  
  You can either change the sysctl or the tunable from loader in case
  you need to map at a virtual address of 0, for example when running
  any of the extinct species of a set of a.out binaries, vm86 emulation, ..
  In that case set security.bsd.map_at_zero="1".
  
  Superseeds:             r197537
  In collaboration with:  jhb, kib, alc
  
  Revision  Changes    Path
  1.306     +5 -0      src/sys/kern/init_main.c
  1.339     +12 -3     src/sys/kern/kern_exec.c



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200910021749.n92Hn7aX056068>