lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040316170752.GA16817@northernsecurity.net> From: thomas at northernsecurity.net (Thomas Sjögren) Subject: a secure base system On Mon, Mar 15, 2004 at 09:38:06PM +0100, Tobias Weisserth wrote: > > $ readelf -l /bin/bash | grep interpreter > > [Requesting program interpreter: /lib/ld-linux.so.2] > > > > $ /lib/ld-linux.so.2 /bin/bash --version > > GNU bash, version 2.05b.0(1)-release (i386-redhat-linux-gnu) > > Copyright (C) 2002 Free Software Foundation, Inc. > > Well, at least the noexec option for /tmp prevents 99% of available > ready-to-run exploits and root kits to execute properly, since they were > written to run from within /tmp. I guess this takes care of most of the > simple "script-kiddies". But you're right. I doesn't really "solve" the > problem. But it raises the bar because exploits have to be adapted and > luckily not everybody is able to do this. http://linux.bkbits.net:8080/linux-2.4/cset@...267.1.85 ^^^^^^^^^ "This patch submitted by Ullrich Drepper to 2.6 last week fixes the behaviour of 'noexec' mounted partitions. Up until now it was possible to circumvent the 'noexec' flag and run binaries off a 'noexec' partition by using ld-linux.so.2 or any other executable loader. This patch allows to properly honour the 'noexec' behaviour." and setting /tmp noexec under Debian will probably break apt (section 4.9.1, http://www.debian.org/doc/manuals/securing-debian-howto/ch4.en.html#s4.9) /Thomas -- == thomas@...thernsecurity.net | thomas@...linux.org == Encrypted e-mails preferred | GPG KeyID: 114AA85C -- -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 481 bytes Desc: Digital signature Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040316/fa664f4a/attachment.bin
Powered by blists - more mailing lists