Re: [PATCH] [SECURITY] suid procs exec'd with bad 0,1,2 fds

Alex Buell (alex.buell@tahallah.demon.co.uk)
Wed, 5 Aug 1998 00:46:03 -0400 (EWT)


On Tue, 4 Aug 1998, Edward S. Marshall wrote:

> Bingo. This isn't an issue to software developers; frankly, they created
> the problem. This is an -administration- issue, for people who can't
> necessarily fix their software (don't know how, don't have source, can't
> make software upgrades due to dependancies on other factors, don't have
> the staff to be constantly monitoring security releases, etc).

The *ideal* solution is to wire up the terminals to a 20,000v connection.
Then if the hacker-wannabe tries to do a buffer overflow attack
automatically gets fried to a lovely shade of black cider. End of wannabe.

Cheers,
Alex

--
 /\_/\  Legalise cannabis now! 
( o.o ) Grow some cannabis today!
 > ^ <  Peace, Love, Unity and Respect to all.

http://www.tahallah.demon.co.uk

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.altern.org/andrebalsa/doc/lkml-faq.html