-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Daniel Drake wrote:
> Hi,
> 
> The local root exploit-of-the-week would have been unable to run if our
> users systems had /proc mounted with nosuid and/or noexec
> 
> It would be worthwhile considering making this a default. What are
> people's thoughts?
> 
> Additional testing of this change would be appreciated (just ensure that
> nothing breaks). To do it as a one off:
> 
> # mount -o remount,nosuid,noexec /proc
> 
> To make it more permanent, /etc/fstab has:
> 
>     proc    /proc    proc        defaults        0 0
> 
> Change to:
> 
>     proc    /proc    proc        nosuid,noexec        0 0

Is there an open bug or security advisory for this exploit I missed? I tried the
CLI solution; works just fine here. No wild behavior so far. Any suggestions on
what to look for, or how to really hammer /proc? :)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEufPcrsJQqN81j74RAjHhAJ9wbrRi/h8b603Ra8W6F5uk0biDVACcCy62
WX+lVNRJoJNTLAG2wxg9Mlc=
=RVRq
-----END PGP SIGNATURE-----
-- 
[email protected] mailing list

Reply via email to