[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: בעניין: p.s. (was: Re: Shutdown by a user)



Quoth guy keren on Sat, Jul 22, 2000:
> the way you describe this - you ight as well give those users the root
> password, as your little program can be quite trivially fooled into
> running any code the user wants to. in general, one should NOT write suid
> programs without proper security checking.

True.

> just as an example, one could
> use the LD_PRELOAD environment variable in order to load a library that
> defines 'system' as a function that simply spawns a shell and attaches its
> prompt to the user's terminal.

In sane systems (which, in this case, I believe, include Linux)
LD_PRELOAD and LD_LIBRARY_PATH are not used when running setuid
or setgid binaries.  This is to allow such binaries to be
dynamically linked without opening too many security holes.

> no, sudo is better here.

Agreed.  Why develop a special application when you have general
ones?

Vadik.

-- 
Real software engineers don't debug programs, they verify correctness.
This process doesn't necessarily involve execution of anything on a
computer, except perhaps a Correctness Verification Aid package.

=================================================================
To unsubscribe, send mail to linux-il-request@linux.org.il with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail linux-il-request@linux.org.il