Back to Home / #uml / 2011 / 12 / Prev Day | Next Day
#uml IRC Logs for 2011-12-06

---Logopened Tue Dec 06 00:00:43 2011
01:17-!-kunir [~kunir@shell.metropolia.fi] has joined #uml
01:38-!-SNy [18c86806e5@bmx-chemnitz.de] has joined #uml
08:31-!-avinashhm [~avinash-h@192.94.92.11] has joined #uml
09:22-!-avinashhm [~avinash-h@192.94.92.11] has quit [Quit: Leaving]
10:21-!-hfb [~hfb@cpe-98-151-249-95.socal.res.rr.com] has quit [Quit: Leaving]
10:54-!-adiblol [~adiblol@a20071105100857.zb.lnet.pl] has joined #uml
11:02<adiblol:#uml>i didn't find it in any mail archives: there is a security bug in uml 2.6.32 (debian wheezy) which makes possible to access files outside hostfs=... path by simply mounting hostfs like: mount none /mnt/host -t hostfs -o ..
11:02<adiblol:#uml>and i can't access wiki mentioned in channel topic. 502 proxy error.
11:05<adiblol:#uml>is the bug still in newer versions so i just have to disable hostfs during compilation (and make it completly unusable)?
11:37-!-hfb [~hfb@pool-98-119-109-63.lsanca.dsl-w.verizon.net] has joined #uml
12:14<adiblol:#uml>ok, the bug exists in 3.1.4, too, just compiled.
12:18<adiblol:#uml>any *secure* way of sharing filesystem (except i.e. nfs)?
12:19<adiblol:#uml>(also echo o > /proc/sysrq-trigger is broken in 3.1.4)
12:34-!-aindilis [~aindilis@173-165-36-107-Illinois.hfc.comcastbusiness.net] has quit [Read error: Connection reset by peer]
12:38-!-aindilis [~aindilis@173-165-36-107-Illinois.hfc.comcastbusiness.net] has joined #uml
13:37-!-shadowdaemon [~shadowdae@araminta.gangsta-paradise.org] has quit [Ping timeout: 480 seconds]
16:14-!-hfb [~hfb@pool-98-119-109-63.lsanca.dsl-w.verizon.net] has quit [Quit: Leaving]
16:15-!-mixi [~mixi@pass-4d0d426b.pool.mediaWays.net] has joined #uml
16:15<mixi:#uml>hi there. is it possible to build uml on 64b cygwin?
17:33-!-mixi_ [~mixi@pass-4d0d426b.pool.mediaWays.net] has joined #uml
17:40-!-mixi [~mixi@pass-4d0d426b.pool.mediaWays.net] has quit [Ping timeout: 480 seconds]
19:48<adiblol:#uml>if features such as hostfs exist, isn't it possible that kind of bad guy compiles malicious code which uses host syscalls as kernel module and then insmod it inside uml to gain control over host system?
19:51-!-mixi_ [~mixi@pass-4d0d426b.pool.mediaWays.net] has quit [Read error: Connection reset by peer]
19:54-!-mixi [~mixi@pass-4d0d426b.pool.mediaWays.net] has joined #uml
20:04-!-avinashhm [~avinash-h@192.94.92.14] has joined #uml
23:59-!-VS_ChanLog [~stats@ns.theshore.net] has left #uml [Rotating Logs]
23:59-!-VS_ChanLog [~stats@ns.theshore.net] has joined #uml
---Logclosed Wed Dec 07 00:00:54 2011