/wrote Stefan Westerfeld <[EMAIL PROTECTED]> [Thu, 29 Aug 2002 21:16:59
+0200]

|   Hi!
|
|On Wed, Aug 28, 2002 at 10:15:54AM -0400, Paul Davis wrote:
|> a side note: JACK, when run in RT mode, launches its own maximal
|> priority thread to perform exactly this function. all other RT threads
|> run at lower priorities. i believe that it is not possible to use JACK
|> to perform DOS attacks like this unless the client modifies its
|> scheduling priority itself.
|
|As far as I understood this, you have a client thread with raised priority
|that gets monitored. However, couldn't an attacker fork() in this thread,
|to transport priviledges to another (unrelated) process, and then kill -9
|all other processes with priviledges, and then do his DOS attack?

Anyway, what is the point of all this? I have nothing against security,
but: 

  1. that dos vulnerability is a local one
  2. local dos vulnerabilities are of importance for systems where 
     "untrusted" users are roaming

2 doesn't seem like the typical setup where one would run a server
dedicated to realtime audio like JACK, especially not in RT mode, as
you'd have no guarantee anyway you'd have enough cpu for the many 
softsynths/audio software you'd want to play with..

Of course nothing forbids in an imaginary world to use jack 
as an esd/arts replacement, but it doesn't make sense then to run
it in RT mode.

Reply via email to