Re: [announce] [patch] NX (No eXecute) support for x86, 2.6.7-rc2-bk2
From: Andy Lutomirski
Date: Thu Jun 03 2004 - 18:58:09 EST
Andi Kleen wrote:
The whole point of NX, though, is that it prevents certain classes of
exploits. If a setuid binary is vulnerable to one of these, then Ingo's
patch "fixes" it. Your approach breaks that.
Good point.
But that only applies to the NX personality bit. For the uname emulation
it is not an issue.
So maybe the dropping on exec should only zero a few selected
personality bits, but not all.
True.
I don't like Ingo's fix either, though. At least it should check
CAP_PTRACE or some such. A better fix would be for LSM to pass down a flag
indicating a change of security context. I'll throw that in to my
caps/apply_creds cleanup, in case that ever gets applied.
Don't think we should require an LSM module for that. That's
far overkill.
I'm not suggesting a new LSM module. I'm suggesting modifying the existing
LSM code to handle this cleanly. We already have a function
(security_bprm_secureexec) that does something like this, and, in fact,
it's probably the right thing to test here.
I'm currently compiling a new patch (modified from my last caps cleanup)
that makes a new bitfield for this stuff. I don't know if it's worth
applying, but I'll send it off to Andrew once I convince myself it works.
--Andy
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/