On Sun, 10 Oct 2004 11:46:56 +0800, Paolo Alexis Falcone
<[EMAIL PROTECTED]> wrote:
> One more reason to use 2.6 kernels I guess.
> 
> It's a common security practice to mount /tmp with noexec. However,
> this doesn't prevent the following to happen if you're still using a
[snipped]

Hey. That's  cool. Buti na lang ayaw pa nito sa 2.6. I tested it on my
machine right now (FC2 with 2.6.6) at OK hindi nga gumana, 'di tulad
ng nangyari sa demo kahapon sa exploit na 'yon.

Well, I guess ang paraan lang talaga is to patch the kernel and/or
glibc, or you could go use "extraordinary" measure like SE Linux
and/or POSIX ACLs.

Now... where can I use the exploit.... just kidding. ;)

-- 
Gideon N. Guillen
[EMAIL PROTECTED]

Take back the web! Download Firefox Today!
http://www.spreadfirefox.com/?q=affiliates&amp;id=6670&amp;t=58
--
Philippine Linux Users' Group (PLUG) Mailing List
[EMAIL PROTECTED] (#PLUG @ irc.free.net.ph)
Official Website: http://plug.linux.org.ph
Searchable Archives: http://marc.free.net.ph
.
To leave, go to http://lists.q-linux.com/mailman/listinfo/plug
.
Are you a Linux newbie? To join the newbie list, go to
http://lists.q-linux.com/mailman/listinfo/ph-linux-newbie

Reply via email to