1 |
On Tue, 2004-08-10 at 05:59, Tobias Klausmann wrote: |
2 |
> Hi! |
3 |
> |
4 |
> On Tue, 10 Aug 2004, Alex Efros wrote: |
5 |
> > But there a number of suid progs which probably don't really need to be suid: |
6 |
> > |
7 |
> > -rwsr-x--- 1 root cron 632 ??? 13 05:52 /etc/init.d/dcron |
8 |
> > |
9 |
> > No comments. :( |
10 |
> |
11 |
> This is probably a bug in the dcron ebuild. It's not *that* bad |
12 |
> since programs using the #! hack aren't really executed SUID[*]. |
13 |
> Still, it would be wise to file a bug in Bugzilla about this. |
14 |
|
15 |
http://bugs.gentoo.org/show_bug.cgi?id=42908 |
16 |
|
17 |
|
18 |
> |
19 |
> [*] unless you have patched your kernel in that respect. |
20 |
> |
21 |
> > -rwsr-xr-x 1 root root 804924 ??? 13 14:17 /usr/bin/gpg |
22 |
> > |
23 |
> > Yeah, I know, gpg WANT to be suid to do something with protecting it's |
24 |
> > memory, but is this really give any benefits? I mean, it's anyway possible |
25 |
> > for root to read it's memory from /dev/kmem, and it's anyway impossible to |
26 |
> > read it's memory from swap-partition for usual user because permissions |
27 |
> > for any disk partitions are 0600. |
28 |
> |
29 |
> What about you data landing on a swap partition, not being erased |
30 |
> and then someone stealing your laptop/harddisk? |
31 |
> |
32 |
> |
33 |
> Greets, |
34 |
> Tobias |
35 |
> |
36 |
> -- |
37 |
> gentoo-security@g.o mailing list |
38 |
-- |
39 |
Ned Ludd <solar@g.o> |
40 |
Gentoo (hardened,security,infrastructure,embedded,toolchain) Developer |