RemoveSETUID feature (Was: Summary/Minutes from today's FESCo meeting (2010-10-26) NEW TIME!)

Dick Tayter dicktayter at gmail.com
Wed Dec 22 06:46:13 UTC 2010


2010/12/21 Miloslav Trmač:

> If an attacker were controlling a process running with uid 0 and no
> capabilities at all, and /bin/sh were 0555, nothing prevents the
> attacker from chmod()ing /bin/sh to 0755 and overwriting it.  This makes
> any attempts to change the file permissions rather pointless.
>

You don't even need to change permissions for root to be able to delete or
change the contents of the directory.

Dick
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.fedoraproject.org/pipermail/devel/attachments/20101222/33f0efd1/attachment.html 


More information about the devel mailing list