Gentoo Archives: gentoo-security

From: Ned Ludd <solar@g.o>
To: Tobias Klausmann <klausman@××××××××××××.de>
Cc: gentoo-security@l.g.o
Subject: Re: [gentoo-security] SUID progs
Date: Fri, 13 Aug 2004 18:50:50
Message-Id: 1092422932.32030.164.camel@simple
In Reply to: Re: [gentoo-security] SUID progs by Tobias Klausmann
1 On Tue, 2004-08-10 at 05:59, Tobias Klausmann wrote:
2 > Hi!
3 >
4 > On Tue, 10 Aug 2004, Alex Efros wrote:
5 > > But there a number of suid progs which probably don't really need to be suid:
6 > >
7 > > -rwsr-x--- 1 root cron 632 ??? 13 05:52 /etc/init.d/dcron
8 > >
9 > > No comments. :(
10 >
11 > This is probably a bug in the dcron ebuild. It's not *that* bad
12 > since programs using the #! hack aren't really executed SUID[*].
13 > Still, it would be wise to file a bug in Bugzilla about this.
14
15 http://bugs.gentoo.org/show_bug.cgi?id=42908
16
17
18 >
19 > [*] unless you have patched your kernel in that respect.
20 >
21 > > -rwsr-xr-x 1 root root 804924 ??? 13 14:17 /usr/bin/gpg
22 > >
23 > > Yeah, I know, gpg WANT to be suid to do something with protecting it's
24 > > memory, but is this really give any benefits? I mean, it's anyway possible
25 > > for root to read it's memory from /dev/kmem, and it's anyway impossible to
26 > > read it's memory from swap-partition for usual user because permissions
27 > > for any disk partitions are 0600.
28 >
29 > What about you data landing on a swap partition, not being erased
30 > and then someone stealing your laptop/harddisk?
31 >
32 >
33 > Greets,
34 > Tobias
35 >
36 > --
37 > gentoo-security@g.o mailing list
38 --
39 Ned Ludd <solar@g.o>
40 Gentoo (hardened,security,infrastructure,embedded,toolchain) Developer

Attachments

File name MIME type
signature.asc application/pgp-signature