While the kernel can create files that ignore the mount options, I 
believe that the behaviour is consistent with the rest of the vfs - that 
is, a /proc mounted noexec will not allow files to be executed, even if 
the kernel has created them with the execute bit. Having a noexec/nosuid 
/proc was an acceptable workaround for one of the more recent Linux 
kernel vulnerabilities, so there's a chance that it'll help avoid 
future attacks.

The /dev case is more subtle. Vbetool mmaps /dev/zero, so is probably 
what's getting upset there.
-- 
Matthew Garrett | [EMAIL PROTECTED]

-- 
Virtual filesystem mounts could use more restrictive mount options
https://launchpad.net/bugs/54530

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to