-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Sridhar Dhanapalan wrote:
> On Tuesday 19 December 2006 08:26, "Voytek Eymont" <[EMAIL PROTECTED]>
wrote:
>> on several ocassions I had malware downloaded and executed from /tmp
>> (through CMS vulnerability);
>>
>> there was a suggestion here to mount /tmp as non executable;
>>
>> - do I need to partition the HD and make a separate partition for /tmp?
>> - good/bad/excellent idea ?
>
> I've been doing this for a number of years. Generally it is a good idea. I
> think the only time I find it a nuisance is when using the Loki Installer
> (which is used to install games like the Unreal Tournament series). By
> default, it tries to extract itself and run from /tmp. The resulting error
> when it discovers that it can't execute is cryptic. The extraction area
can
> be modified with a flag, which IIRC is '--target <destination directory>'.

To get around that problem you can always re-mount with executable
while you run the installs you need (UT series, other Loki based
installers...).  You're best off leaving things that don't need
execution privileges without them ;)

Hoo Roo,
Alex.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFFiSf9g5/KyzD/6f0RAi2pAJ4uv3/eYdMtv/2T1lC824xL8vv7WgCghWAj
wiBBFZ9LUNF+F68p9TF1Q5E=
=AOsz
-----END PGP SIGNATURE-----

-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to