lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4DDE99A9.60401@elektron.elka.pw.edu.pl>
Date:	Thu, 26 May 2011 20:19:21 +0200
From:	"wzabolot@...ktron.elka.pw.edu.pl" <W.Zabolotny@...a.pw.edu.pl>
To:	linux-kernel@...r.kernel.org
Subject: Wrong (0777) permissions on root filesystem after booting the kernel

Hi,

Today I've stated, that in my laptop the root filesystem is mounted with 
very dangerous 0777 permissions. I've checked my other machines, and 
stated that in total 3 machines behave correctly (0755) and 2
mount / with permissions 0777.

Trying to find the cause, I've stated that it is not associated with 
initialization scripts, as booting with "init=/bin/bash" also leads to 
situation, where in one machine permissions are set to 0777, while in 
the another one, they are set to 0755.

The problem is not associated with the initrd, as it appears also when 
booting machine with kernel without initrd.

I've investigated settings of the bootloader (grub), but there is
no visible difference between affected and correctly working machines.

What information is used by the kernel to set permissions when mounting 
the root filesystem?
How does it depend on particular machine?
-- 
TIA & Regards,
Wojtek
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ