Re: [PATCH] [SECURITY] suid procs exec'd with bad 0,1,2 fds

Olivier Galibert (galibert@pobox.com)
Wed, 5 Aug 1998 08:17:14 +0200


On Tue, Aug 04, 1998 at 11:27:53PM -0400, linker@z.ml.org wrote:
> A noexec stack patch would only need to delay the hackers a few hours to
> save your site.

It will delay the bugtraq[1]-reading script kiddies[2] if and only if
the scripts given there aren't designed to work around the noexec
stack hack. If the patch jumps into the official kernel, the
white-hat guys who, for some reason I can't envision, think that "full
disclosure" means "give a root exploit" and are good programmers
*will* work around it.

Hence, you're much more "protected" if the patch stays as non-official
as it is.

OG.

[1] Replace bugtraq by rootshell or whatever
[2] The people able to write exploits themselves are out of the
picture from the start

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.altern.org/andrebalsa/doc/lkml-faq.html