[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Security implications of allowing init to re-exec from another path



martin f krafft <madduck@debian.org> wrote:
> ... sounds like a nice way to infest a system with a trojan, in
> addition to kernel modules and other Linux maladities. That is, if
> the attacker gets root...

However, root can also patch the init image and get the same result. So it
is better if init is actually supporting this, logging it and manipulating
the cmdline so that it is obvious.

Gruss
Bernd



Reply to: