On 2024-03-25, Lyndon Nerenberg (VE7TFX/VE6BBM) <lyn...@orthanc.ca> wrote:
> I am curious to hear peoples thoughts on adding some mount(2)
> hardening when the system is running at securelevel 2.  Specifically:
>
>       * do not allow removing MT_NODEV, MT_NOEXEC, MT_NOSUID,
>         or MT_RDONLY in conjunction with MNT_UPDATE
>
>       * do not allow MNT_WXALLOWED in conjunction with
>         MNT_UPDATE
>
> Currently, if someone does manage to get a root toehold on a host,
> they can remove noexec from /tmp as a possible springboard to upload
> nasties, and then change /usr from read-only to read-write and
> scribble all over your binaries.

I think you'd need to disable mount completely, otherwise you can mount
a new writable filesystem (e.g. MFS) that doesn't have noexec.


-- 
Please keep replies on the mailing list.

Reply via email to