Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Typical defense against this is to mount all user-writable filesystems as `noexec` but unfortunately most OSes don't do that out of the box.




It could have created a bash alias then. And I don't think a dev wants to be restricted in creating executables. Again, if a dev can do it, so can the malware.

I remember you could trivially circumvent that with „/lib/ld-linux.so <executable>“. Does that no longer work?

noexec now prevents mmaping files on that filesystem as executable.

Kinda hard to work as a software developer then.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: