Hello Ben,

Ben Hutchings wrote:
You seem to be a bit confused about this vulnerability.  /bin/bash is of
course not suid-root, only owned by root.

You're right. To correct this: It is a big problem for suid-root binaries, but even a 
problem for non-suid-root-binaries like "/bin/bash" - if you can write to 
/bin/bash after fooling the admin to run chown on your home, you own the system as soon 
as root logs in or some shell script is started as root.

Thanks for the information about POSIX.

Many distributions apply many patches that are not upstream.  We
generally try to avoid doing that in the standard kernel images.
Do you see any way to deny the described attacks (flooding /tmp, hardlinking 
insecure suid binaries) without this patch?

However, we may add kernel images with the 'grsec' featureset for the
next release (wheezy).
That sounds good.

Thanks

Max




--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to