Re: [PATCH] [SECURITY] suid procs exec'd with bad 0,1,2 fds

John Summerfield (summer@os2.ami.com.au)
Wed, 5 Aug 1998 10:13:17 +0800 (WST)


On Tue, 4 Aug 1998, Brandon S. Allbery KF8NH wrote:

> In message <199808041827.OAA18688@jupiter.cs.uml.edu>, "Albert D. Cahalan"
> writ
> es:
> +-----
> | OS/390 does something like that, even for non-setuid processes.
> | (no problems either: OS/390 is UNIX) So gcc could be hacked.
> +--->8
>
> On which planet? OS/390 is a cross of MVS and VM; it has a POSIX
> compatibility layer, but its guts are *not* Unix-like.

Not much of VM when I looked late last year. But it sure ain't unix by any
stretch of the imagination.

though the box I saw was running ftpd, TCP/IP (plus Lanserver) and the
usual MVS junk.

For an MVS (including OS/390) program to have equivalent of root privilege
it has to compe from a specified authorised program library AND be
link-edited with the AC attribute.

Unless mandated by RACF or equivalent security software, anyone can run
it
(but it usually IS controlled by such software).

The MVS security model is one I'd dearly like to see in Linux.

>

Cheers
John Summerfield
OS/2 Support at http://www.ami.com.au/os2/
Configuration, networking answers
IBM ftp site search

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.altern.org/andrebalsa/doc/lkml-faq.html