Date: Fri, 2 Oct 2009 17:48:51 +0000 (UTC) From: "Bjoern A. Zeeb" <bz@FreeBSD.org> To: cvs-src-old@freebsd.org Subject: cvs commit: src/sys/kern init_main.c kern_exec.c Message-ID: <200910021749.n92Hn7aX056068@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
bz 2009-10-02 17:48:51 UTC FreeBSD src repository Modified files: sys/kern init_main.c kern_exec.c Log: SVN rev 197711 on 2009-10-02 17:48:51Z by bz Add a mitigation feature that will prevent user mappings at virtual address 0, limiting the ability to convert a kernel NULL pointer dereference into a privilege escalation attack. If the sysctl is set to 0 a newly started process will not be able to map anything in the address range of the first page (0 to PAGE_SIZE). This is the default. Already running processes are not affected by this. You can either change the sysctl or the tunable from loader in case you need to map at a virtual address of 0, for example when running any of the extinct species of a set of a.out binaries, vm86 emulation, .. In that case set security.bsd.map_at_zero="1". Superseeds: r197537 In collaboration with: jhb, kib, alc Revision Changes Path 1.306 +5 -0 src/sys/kern/init_main.c 1.339 +12 -3 src/sys/kern/kern_exec.c
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200910021749.n92Hn7aX056068>