From owner-cvs-src-old@FreeBSD.ORG Fri Oct 2 17:49:07 2009 Return-Path: Delivered-To: cvs-src-old@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id CC8461065694 for ; Fri, 2 Oct 2009 17:49:07 +0000 (UTC) (envelope-from bz@FreeBSD.org) Received: from repoman.freebsd.org (repoman.freebsd.org [IPv6:2001:4f8:fff6::29]) by mx1.freebsd.org (Postfix) with ESMTP id BA7E18FC21 for ; Fri, 2 Oct 2009 17:49:07 +0000 (UTC) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.14.3/8.14.3) with ESMTP id n92Hn7AA056069 for ; Fri, 2 Oct 2009 17:49:07 GMT (envelope-from bz@repoman.freebsd.org) Received: (from svn2cvs@localhost) by repoman.freebsd.org (8.14.3/8.14.3/Submit) id n92Hn7aX056068 for cvs-src-old@freebsd.org; Fri, 2 Oct 2009 17:49:07 GMT (envelope-from bz@repoman.freebsd.org) Message-Id: <200910021749.n92Hn7aX056068@repoman.freebsd.org> X-Authentication-Warning: repoman.freebsd.org: svn2cvs set sender to bz@repoman.freebsd.org using -f From: "Bjoern A. Zeeb" Date: Fri, 2 Oct 2009 17:48:51 +0000 (UTC) To: cvs-src-old@freebsd.org X-FreeBSD-CVS-Branch: HEAD Subject: cvs commit: src/sys/kern init_main.c kern_exec.c X-BeenThere: cvs-src-old@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: **OBSOLETE** CVS commit messages for the src tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Oct 2009 17:49:07 -0000 bz 2009-10-02 17:48:51 UTC FreeBSD src repository Modified files: sys/kern init_main.c kern_exec.c Log: SVN rev 197711 on 2009-10-02 17:48:51Z by bz Add a mitigation feature that will prevent user mappings at virtual address 0, limiting the ability to convert a kernel NULL pointer dereference into a privilege escalation attack. If the sysctl is set to 0 a newly started process will not be able to map anything in the address range of the first page (0 to PAGE_SIZE). This is the default. Already running processes are not affected by this. You can either change the sysctl or the tunable from loader in case you need to map at a virtual address of 0, for example when running any of the extinct species of a set of a.out binaries, vm86 emulation, .. In that case set security.bsd.map_at_zero="1". Superseeds: r197537 In collaboration with: jhb, kib, alc Revision Changes Path 1.306 +5 -0 src/sys/kern/init_main.c 1.339 +12 -3 src/sys/kern/kern_exec.c