Subject: Re: NetBSD Security Advisory 2000-001
To: Chris Jones <chris@cjones.org>
From: Daniel Carosone <dan@geek.com.au>
List: tech-security
Date: 02/16/2000 20:03:17
by redmail.netbsd.org with SMTP; 16 Feb 2000 09:12:26 -0000
by geek.com.au (8.8.8/8.8.8) id UAA27356;
Wed, 16 Feb 2000 20:03:18 +1100 (EST)
From: Daniel Carosone <dan@geek.com.au>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Date: Wed, 16 Feb 2000 20:03:17 +1100 (EST)
To: Chris Jones <chris@cjones.org>
Cc: tech-security@netbsd.org
Subject: Re: NetBSD Security Advisory 2000-001
In-Reply-To: <x6zot2w3h2.fsf@reddwarf.rightnowtech.com>
References: <14505.23693.773699.404104@passion.geek.com.au>
<x6zot2w3h2.fsf@reddwarf.rightnowtech.com>
Message-ID: <14506.26233.23859.399366@passion.geek.com.au>
Philosophical discussions aside, let's return for a moment to the
original question..
Chris Jones writes:
> > If this action cannot be taken, an immediate workaround is to disable
> > the use of the proc filesystem. It is not mounted by default in NetBSD,
> > and nothing in the NetBSD base tree depends on it. You can disable
> > it by removing any procfs lines from /etc/fstab.
>
> What about user mounts of procfs filesystems?
Specifically in the case of someone who cannot patch or upgrade ust
yet, are they still vulnerable via user mounts?
It's a very good question, and one for which I'd like an authoritative
answer so I can adjust the SA as needed. Any takers, please?
--
Dan.