Richard Kettlewell <
invalid@invalid.invalid> wrote:
[ ... ]
Stopping unprivileged users getting a file descriptor onto anything that might be executing, or executed, with different credentials would reduce
risk by excluding all attacks that depended somehow on getting a file descriptor onto the target file. As already noted there?s a problem with shared libraries.
That doesn't solve anything. Letting an unprivileged user modify
the cached copy of files is BAAAAD. It doesn't have to be executable
code. /etc/passwd would be a good one, poke zeros in your uid:gid
fields, log out, log back in.
Even without privilege escalation, corrupting (cached copies of) random
files can wreak havoc.
--- PyGate Linux v1.5.14
* Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)