Re: Power Management et. al.
>
>hehehe, well what got me thinking, is mol runs with root privileges
>full time. and macos has no security whatsoever.. so does this mean
>that an errant MacOS app can screw with things on the linux side that
>would ordinarily be privileged? i would guess not, but its fun to
>think about.
>
>my main concern is the massive setuid root binary that mol is. i
>think any debian package should offer to add a group and restrict
>permissions to the setuid mol bins.
MOL emulates a virtual machine. So MacOS code cannot access anything
outside of this emulated environement. The only security risk I can
see is around the fake "drivers" used to communicate between MOL and
MacOS. I don't know if they are fully safe against things like buffer
overflow attacks or such. Also, make sure not to export to MacOS
disk partitions with critical informations ;)
Ben.
Reply to: