sudo and changes in packaging guidelines

Jon Ciesla limburgher at gmail.com
Fri Apr 13 19:28:49 UTC 2012


On Fri, Apr 13, 2012 at 2:16 PM, Frank Ch. Eigler <fche at redhat.com> wrote:
>
> ajax wrote:
>
>> [...]
>>> If this is meant to cover administrative binaries that have no
>>> privilege escalation pieces of their own, merely run by root, then
>>> what makes them different from any other /bin/* program that a root
>>> process might invoke?
>>
>> It's not meant to cover that.  That phrasing is meant to cover system
>> components like init that do not function _unless_ run as uid 0.
>
> OK.  Can you point to an attack scenario against such binaries that
> would not also apply against some non-uid0-only binary that root
> may incidentally run?

The intent wasn't to imply that these were the only binaries that
would benefit from this protection, just to point out that this is a
good idea and mandate it for a set of critical binaries without
forcing it distro-wide, which would apply it to binaries that might
not benefit from and needlessly suffer a performance hit or build
failure.

-J

> - FChE
> --
> devel mailing list
> devel at lists.fedoraproject.org
> https://admin.fedoraproject.org/mailman/listinfo/devel



-- 
http://cecinestpasunefromage.wordpress.com/
------------------------------------------------
in your fear, seek only peace
in your fear, seek only love

-d. bowie


More information about the devel mailing list