Research
.
Skip Search Box

SELinux Mailing List

Re: Still getting random execute permissions on shared libraries.

From: Stephen Smalley <sds_at_epoch.ncsc.mil>
Date: Mon, 29 Nov 2004 09:38:43 -0500


On Fri, 2004-11-26 at 14:49, petre rodan wrote:
> I made a patch to the kernel that reverts to the old behaviour. no more execs on random files.
> I find that changing the policy to allow those execs is not a valid solution.
>
> would it be feasible to send upstream a patch that would remove the 'exec on read' behaviour if the kernel has selinux capabilities?

Removing it completely would be a problem if you want to support any binaries at all that are assuming that read implies exec.   

-- 
Stephen Smalley <sds@epoch.ncsc.mil>
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
Received on Mon 29 Nov 2004 - 09:43:58 EST
 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009

 
bottom

National Security Agency / Central Security Service