[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1159905265.2891.551.camel@laptopd505.fenrus.org>
Date: Tue, 03 Oct 2006 21:54:25 +0200
From: Arjan van de Ven <arjan@...radead.org>
To: Stas Sergeev <stsp@...et.ru>
Cc: Ulrich Drepper <drepper@...hat.com>,
Linux kernel <linux-kernel@...r.kernel.org>,
Alan Cox <alan@...rguk.ukuu.org.uk>,
Hugh Dickins <hugh@...itas.com>, Valdis.Kletnieks@...edu
Subject: Re: [patch] remove MNT_NOEXEC check for PROT_EXEC mmaps
On Tue, 2006-10-03 at 23:40 +0400, Stas Sergeev wrote:
> Hello.
>
> Ulrich Drepper wrote:
> > You really don't get it, do you.
> Yes, sorry. :)
>
> > The way ld.so works can be implemented
> > in many other forms with other programs.
> Having "noexec" (in its older form) on *every* user-writable
> mount makes it harder for an attacker to run his own loaders,
> so implementing it in other forms was useless in the past.
>
> > With some time and energy you
> > likely can write a perl or python script to do it.
> This is solvable the same way too - "chmod 'o-x' perl"
and chmod o-x bash ....
at which point.. game over.
(and yes you can do in bash pretty much what you can do in perl. heck
you can prove that.. shell is turning complete ;)
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists