Re: [gentoo-dev] Making procfs mount as nosuid,noexec by default

2006-07-16 Thread Chris Gianelloni
On Sat, 2006-07-15 at 15:20 -0400, Mike Frysinger wrote: > On Saturday 15 July 2006 13:41, Ned Ludd wrote: > > On Sat, 2006-07-15 at 17:45 +0100, Daniel Drake wrote: > > > The local root exploit-of-the-week would have been unable to run if our > > > users systems had /proc mounted with nosuid and/o

Re: [gentoo-dev] Making procfs mount as nosuid,noexec by default

2006-07-16 Thread Drake Wyrm
Ned Ludd <[EMAIL PROTECTED]> wrote: > Not 100% sure about the noexec part as that might break upx which > calls /proc/self/exe as part of it's decompresser routines. /proc/self/exe is a symlink, and the permissions of symlinks aren't used for anything. It's less than trivial (and I think impossi

Re: [gentoo-dev] Making procfs mount as nosuid,noexec by default

2006-07-16 Thread Christian Heim
On Sunday 16 July 2006 10:07, Josh Saddler wrote: >Daniel Drake wrote: >> Hi, >> >> The local root exploit-of-the-week would have been unable to run if our >> users systems had /proc mounted with nosuid and/or noexec >> >> It would be worthwhile considering making this a default. What are >> people

Re: [gentoo-dev] Making procfs mount as nosuid,noexec by default

2006-07-16 Thread Josh Saddler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Daniel Drake wrote: > Hi, > > The local root exploit-of-the-week would have been unable to run if our > users systems had /proc mounted with nosuid and/or noexec > > It would be worthwhile considering making this a default. What are > people's though

Re: [gentoo-dev] Making procfs mount as nosuid,noexec by default

2006-07-15 Thread Doug Goldstein
Daniel Drake wrote: > Hi, > > The local root exploit-of-the-week would have been unable to run if our > users systems had /proc mounted with nosuid and/or noexec > > It would be worthwhile considering making this a default. What are > people's thoughts? > > Additional testing of this change woul

Re: [gentoo-dev] Making procfs mount as nosuid,noexec by default

2006-07-15 Thread Mike Frysinger
On Saturday 15 July 2006 13:41, Ned Ludd wrote: > On Sat, 2006-07-15 at 17:45 +0100, Daniel Drake wrote: > > The local root exploit-of-the-week would have been unable to run if our > > users systems had /proc mounted with nosuid and/or noexec > > > > It would be worthwhile considering making this a

Re: [gentoo-dev] Making procfs mount as nosuid,noexec by default

2006-07-15 Thread Ned Ludd
On Sat, 2006-07-15 at 13:41 -0400, Ned Ludd wrote: > On Sat, 2006-07-15 at 17:45 +0100, Daniel Drake wrote: > > Hi, > > > > The local root exploit-of-the-week would have been unable to run if our > > users systems had /proc mounted with nosuid and/or noexec > > > > It would be worthwhile conside

Re: [gentoo-dev] Making procfs mount as nosuid,noexec by default

2006-07-15 Thread Ned Ludd
On Sat, 2006-07-15 at 17:45 +0100, Daniel Drake wrote: > Hi, > > The local root exploit-of-the-week would have been unable to run if our > users systems had /proc mounted with nosuid and/or noexec > > It would be worthwhile considering making this a default. What are > people's thoughts? I mai

[gentoo-dev] Making procfs mount as nosuid,noexec by default

2006-07-15 Thread Daniel Drake
Hi, The local root exploit-of-the-week would have been unable to run if our users systems had /proc mounted with nosuid and/or noexec It would be worthwhile considering making this a default. What are people's thoughts? Additional testing of this change would be appreciated (just ensure tha