Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 15 May 2017 16:44:25 -0230
From:      "Jonathan Anderson" <jonathan@FreeBSD.org>
To:        "Ian Lepore" <ian@freebsd.org>
Cc:        "Konstantin Belousov" <kostikbel@gmail.com>, "Alexey Dokuchaev" <danfe@FreeBSD.org>, src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org
Subject:   Re: svn commit: r318313 - head/libexec/rtld-elf
Message-ID:  <DD35C1EE-0AD1-45B6-B22D-798B5E382956@FreeBSD.org>
In-Reply-To: <1494875335.59865.118.camel@freebsd.org>
References:  <201705151848.v4FImwMW070221@repo.freebsd.org> <20170515185236.GB1637@FreeBSD.org> <20170515190030.GG1622@kib.kiev.ua> <1494875335.59865.118.camel@freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On 15 May 2017, at 16:38, Ian Lepore wrote:

> On Mon, 2017-05-15 at 22:00 +0300, Konstantin Belousov wrote:
>> On Mon, May 15, 2017 at 06:52:36PM +0000, Alexey Dokuchaev wrote:
>>>
>>> Does this have any security implications?
>> What do you mean ?
>>
>
> Well, for example, it seems like it would allow anyone to execute a
> binary even if the sysadmin had set it to -x specifically to prevent
> people from running it.

You can already execute "non-executable" binaries using the `exec` shell 
built-in:

```
$ cp /bin/sh .
$ chmod -x sh
$ exec sh
```


Jon
-- 
Jonathan Anderson
jonathan@FreeBSD.org



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?DD35C1EE-0AD1-45B6-B22D-798B5E382956>