>
>hehehe, well what got me thinking, is mol runs with root privileges
>full time.  and macos has no security whatsoever..  so does this mean
>that an errant MacOS app can screw with things on the linux side that
>would ordinarily be privileged?  i would guess not, but its fun to
>think about.  
>
>my main concern is the massive setuid root binary that mol is.  i
>think any debian package should offer to add a group and restrict
>permissions to the setuid mol bins. 

MOL emulates a virtual machine. So MacOS code cannot access anything
outside of this emulated environement. The only security risk I can
see is around the fake "drivers" used to communicate between MOL and
MacOS. I don't know if they are fully safe against things like buffer
overflow attacks or such. Also, make sure not to export to MacOS
disk partitions with critical informations ;)

Ben.



Reply via email to