RemoveSETUID feature (Was: Summary/Minutes from today's FESCo meeting (2010-10-26) NEW TIME!)
Dick Tayter
dicktayter at gmail.com
Wed Dec 22 06:46:13 UTC 2010
2010/12/21 Miloslav Trmač:
> If an attacker were controlling a process running with uid 0 and no
> capabilities at all, and /bin/sh were 0555, nothing prevents the
> attacker from chmod()ing /bin/sh to 0755 and overwriting it. This makes
> any attempts to change the file permissions rather pointless.
>
You don't even need to change permissions for root to be able to delete or
change the contents of the directory.
Dick
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.fedoraproject.org/pipermail/devel/attachments/20101222/33f0efd1/attachment.html
More information about the devel
mailing list