> Please let the user decide if using a /tmp noexec mount point is more
secure or not.

That doesn't even make sense. It's a fact that mounting /tmp with
"noexec" doesn't give you any extra security simply because you can
simply circumvent it by invoking the executable with the help of the
dynamic Linux loader.

Anyone who wants to run an exploit can just run "lib64/ld-
linux-x86-64.so.2 /tmp/bla" instead of just "/tmp/bla" and it will just
work. For scripts, you just invoke them through their interpreter.

Adrian

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/90085

Title:
  When /tmp is mounted noexec, preconfigure fails

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/debconf/+bug/90085/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to