tech-security archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: [PATCH] fexecve
On Nov 15, 2012, at 11:20 AM, Emmanuel Dreyfus wrote:
> Thor Lancelot Simon <tls%panix.com@localhost> wrote:
>
>> The point is, this is interesting functionality that makes something
>> new possible that is potentially useful from a security point of view,
>> but the new thing that's possible also breaks assumptions that existing
>> code may rely on to get security guarantees it wants.
>
> Well, it is standard mandated and we want to be standard compliant. If
> it is a security hazard, we can have a sysctl to disable the system
> call. Something like
> sysctl -w kern.fexecve = 0 and it would return ENOSYS.
Well, I kind of agree that in a chroot, it should not be able to invoke
setuid/setgid programs nor programs not owned by root nor a FD opened
for write.
Home |
Main Index |
Thread Index |
Old Index