Re: [PATCH] [SECURITY] suid procs exec'd with bad 0,1,2 fds

David S. Miller (davem@dm.cobaltmicro.com)
Mon, 3 Aug 1998 09:23:55 -0700


What if a root process wants to put a suid program at the end of a
shell pipeline for example? This changes core unix semantics, and is
a bandaid at best.

Another issue, what's going to propagate to users who care more
quickly, this kernel fix or updates of the packages fixed?

We had an issue like this last year, where someone tried to kill
security exploits by putting a monkey wrench into the kernel
(I'm refereing to the non-executable stack patches). That change
didn't go in, and we're still alive today.

At best this should be a non-official patch for people who want piece
of mind until the linux security audit team takes care of all the
userland bits which can be hit by this bug, not a part of the official
tree.

Later,
David S. Miller
davem@dm.cobaltmicro.com

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.altern.org/andrebalsa/doc/lkml-faq.html