Re: [PATCH] [SECURITY] suid procs exec'd with bad 0,1,2 fds

Martin Mares (mj@ucw.cz)
Wed, 5 Aug 1998 10:41:31 +0200


Hi,

> I answered this question in my explanation, it shouldn't go into the
> main sources until it is done as a correct and clean solution.

What about linking all the sensitive programs with different crtbegin.o
which would call mprotect() to make the stack non-executable? Maybe I've
overseen something, but this looks like a working solution which doesn't
break anything else.

Have a nice fortnight

-- 
Martin `MJ' Mares   <mj@ucw.cz>   http://atrey.karlin.mff.cuni.cz/~mj/
Faculty of Math and Physics, Charles University, Prague, Czech Rep., Earth
"Anyone can build a fast CPU. The trick is to build a fast system." -- S. Cray

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.altern.org/andrebalsa/doc/lkml-faq.html