Boyd Stephen Smith Jr. wrote:
What about hardlinking the suid-root binaries to a hidden location, waiting for a security hole to be found/fixed, and then running the old binary to exploit the hole? Does dpkg handle suid/sgid files so that this is prevented?

Hi,

Having /home, /tmp, (/usr)?/s?bin and /opt on different partitions is a solution. A normal user should not have the right to create a file outside /home or /tmp, and there should be no SUID file outside (/usr)?/s?bin or /opt. No hard-linking is possible across devices.

        François.


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to