Re: [PATCH] [SECURITY] suid procs exec'd with bad 0,1,2 fds

Kragen (kragen@pobox.com)
Fri, 7 Aug 1998 10:29:18 -0400 (EDT)


On Thu, 6 Aug 1998, Alan Cox wrote:
> > What about linking all the sensitive programs with different crtbegin.o
> > which would call mprotect() to make the stack non-executable? Maybe I've
> > overseen something, but this looks like a working solution which doesn't
> > break anything else.
>
> For platforms that can do it this is the right sort of approach. That
> crtbegin can do the fd0/1/2 checking and other things too. Alas Intel is
> not such a platform

Perhaps we could use a different .interp value (/lib/ld-linux-suid.so?)
instead of trying to link with a different crtbegin.o. This is
particularly important in light of ld-linux's ldd features.

Kragen

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.altern.org/andrebalsa/doc/lkml-faq.html