Re: [PATCH] [SECURITY] suid procs exec'd with bad 0,1,2 fds

Jon Lewis (jlewis@inorganic5.fdt.net)
Tue, 4 Aug 1998 12:35:31 -0400 (EDT)


On Tue, 4 Aug 1998, David S. Miller wrote:

> They also break the trampolines emmited naturally by gcc.

Have you actually looked at the secure-linux patches in the past few
months, or do you just not like them and grasp at the past for reasons not
to use them?

bool 'Non-executable user stack area' CONFIG_SECURE_STACK
if [ "$CONFIG_SECURE_STACK" = "y" ]; then
bool ' Autodetect GCC trampolines' CONFIG_SECURE_STACK_SMART
if [ "$CONFIG_SECURE_STACK_SMART" = "y" ]; then
bool ' Emulate trampoline calls' CONFIG_SECURE_STACK_EMULATE
fi
fi

If every time a kernel patch broke something, that patch were forever
banned from becoming part of the standard kernel source (even after the
problems are fixed), we'd still be running something very similar to
1.0.x.

------------------------------------------------------------------
Jon Lewis <jlewis@fdt.net> | Spammers will be winnuked or
Network Administrator | drawn and quartered...whichever
Florida Digital Turnpike | is more convenient.
______http://inorganic5.fdt.net/~jlewis/pgp for PGP public key____

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.altern.org/andrebalsa/doc/lkml-faq.html