On Sun, 10 Oct 2004 11:46:56 +0800, Paolo Alexis Falcone <[EMAIL PROTECTED]> wrote: > One more reason to use 2.6 kernels I guess. > > It's a common security practice to mount /tmp with noexec. However, > this doesn't prevent the following to happen if you're still using a [snipped]
Hey. That's cool. Buti na lang ayaw pa nito sa 2.6. I tested it on my machine right now (FC2 with 2.6.6) at OK hindi nga gumana, 'di tulad ng nangyari sa demo kahapon sa exploit na 'yon. Well, I guess ang paraan lang talaga is to patch the kernel and/or glibc, or you could go use "extraordinary" measure like SE Linux and/or POSIX ACLs. Now... where can I use the exploit.... just kidding. ;) -- Gideon N. Guillen [EMAIL PROTECTED] Take back the web! Download Firefox Today! http://www.spreadfirefox.com/?q=affiliates&id=6670&t=58 -- Philippine Linux Users' Group (PLUG) Mailing List [EMAIL PROTECTED] (#PLUG @ irc.free.net.ph) Official Website: http://plug.linux.org.ph Searchable Archives: http://marc.free.net.ph . To leave, go to http://lists.q-linux.com/mailman/listinfo/plug . Are you a Linux newbie? To join the newbie list, go to http://lists.q-linux.com/mailman/listinfo/ph-linux-newbie
