Re: [PATCH] [SECURITY] suid procs exec'd with bad 0,1,2 fds

Peter T. Breuer (ptb@it.uc3m.es)
Tue, 4 Aug 1998 23:22:28 +0200 (MET DST)


"A month of sundays ago Alan Cox wrote:"
>
> One good thing it does is leave your log file full of messages about the
> attempts. Its very visible when you get attacked

Well that would appear to be an uncontentious benefit then, and why not
have that kind of "level 0" protection in? I'm sure nobody would object to
that.

My 2c. Why I took the non-exec patches out originally was:

1) I had version 1 of the patch, it broke gdb although it said it wouldn't,
and I didn't know there was a version 2 (where?).

2) It changes what might be said to be the heart of the kernel: loading
and executing code. I wasn't honestly able to maintain a change like
that while everybody else was building against a different stack
behaviour - I hardly understood the trampoline work-around. I
already had problems with gdb, and I thought I had problems with java
and ml and python (as I recall). I saw differences between compiled and
interpreted codes that should not have happened. I have felt less
nervous since removing the patch from my source copy. It simplified
life.

Peter ptb@it.uc3m.es

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.altern.org/andrebalsa/doc/lkml-faq.html