Re: [gentoo-dev] Making procfs mount as nosuid,noexec by default

2006-07-16 Thread Josh Saddler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Daniel Drake wrote: Hi, The local root exploit-of-the-week would have been unable to run if our users systems had /proc mounted with nosuid and/or noexec It would be worthwhile considering making this a default. What are people's thoughts?

Re: [gentoo-dev] Making procfs mount as nosuid,noexec by default

2006-07-16 Thread Christian Heim
On Sunday 16 July 2006 10:07, Josh Saddler wrote: Daniel Drake wrote: Hi, The local root exploit-of-the-week would have been unable to run if our users systems had /proc mounted with nosuid and/or noexec It would be worthwhile considering making this a default. What are people's thoughts?

Re: [gentoo-dev] Making procfs mount as nosuid,noexec by default

2006-07-16 Thread Drake Wyrm
Ned Ludd [EMAIL PROTECTED] wrote: Not 100% sure about the noexec part as that might break upx which calls /proc/self/exe as part of it's decompresser routines. /proc/self/exe is a symlink, and the permissions of symlinks aren't used for anything. It's less than trivial (and I think

Re: [gentoo-dev] Making procfs mount as nosuid,noexec by default

2006-07-16 Thread Chris Gianelloni
On Sat, 2006-07-15 at 15:20 -0400, Mike Frysinger wrote: On Saturday 15 July 2006 13:41, Ned Ludd wrote: On Sat, 2006-07-15 at 17:45 +0100, Daniel Drake wrote: The local root exploit-of-the-week would have been unable to run if our users systems had /proc mounted with nosuid and/or noexec

[gentoo-dev] Making procfs mount as nosuid,noexec by default

2006-07-15 Thread Daniel Drake
Hi, The local root exploit-of-the-week would have been unable to run if our users systems had /proc mounted with nosuid and/or noexec It would be worthwhile considering making this a default. What are people's thoughts? Additional testing of this change would be appreciated (just ensure

Re: [gentoo-dev] Making procfs mount as nosuid,noexec by default

2006-07-15 Thread Ned Ludd
On Sat, 2006-07-15 at 13:41 -0400, Ned Ludd wrote: On Sat, 2006-07-15 at 17:45 +0100, Daniel Drake wrote: Hi, The local root exploit-of-the-week would have been unable to run if our users systems had /proc mounted with nosuid and/or noexec It would be worthwhile considering making

Re: [gentoo-dev] Making procfs mount as nosuid,noexec by default

2006-07-15 Thread Mike Frysinger
On Saturday 15 July 2006 13:41, Ned Ludd wrote: On Sat, 2006-07-15 at 17:45 +0100, Daniel Drake wrote: The local root exploit-of-the-week would have been unable to run if our users systems had /proc mounted with nosuid and/or noexec It would be worthwhile considering making this a

Re: [gentoo-dev] Making procfs mount as nosuid,noexec by default

2006-07-15 Thread Doug Goldstein
Daniel Drake wrote: Hi, The local root exploit-of-the-week would have been unable to run if our users systems had /proc mounted with nosuid and/or noexec It would be worthwhile considering making this a default. What are people's thoughts? Additional testing of this change would be