Re: noexec on /dev/shm

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 2011-01-07 at 11:46 +0000, Richard W.M. Jones wrote:
> On Tue, Jan 04, 2011 at 05:42:12PM -0800, Garrett Holmstrom wrote:
> > On Tue, Jan 4, 2011 at 4:31 PM, Bernie Innocenti <bernie@xxxxxxxxxxx> wrote:
> > > What sort of attack would this enable?
> > >
> > > Wait... any unprivileged process can create sockets in the abstract
> > > namespace? Uh-oh.
> > 
> > Any unprivileged process can prevent you from running X on a given
> > display by using up the socket name that X wants to use.  This is a
> > textbook DOS scenario.
> 
> If we have private /tmp this problem would go away.

If we had private /tmp this would not go away, because the user starting
the X server is not always the user whose session it belongs to.
Putting the socket in gdm's /tmp means it won't be someplace where
rjones can get to it.

Also because multiple users on the same display is a completely valid
use case that people actually do.

- ajax

-- 
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux