From: | Adam Carter <adamcarter3@×××××.com> |
---|---|
To: | "gentoo-user@l.g.o" <gentoo-user@l.g.o> |
Subject: | [gentoo-user] Risks of making traceroute suid root |
Date: | Wed, 10 May 2017 23:49:16 |
Message-Id: | CAC=wYCEof5ZBqyFc2ZRg1FDtzPVD6e803NBx6Es-St7unoVqtQ@mail.gmail.com |
1 | I want to allow some fairly well trusted users the ablilty to do traces |
2 | with icmp. I can give them sudo, but how high is the risk of making |
3 | traceroute suid root? AFAIK making text editors or anything that has an |
4 | ability to run shell commands suid root is effectively giving them root |
5 | access, but other than exploiting vulnerabilities in traceroute itself, are |
6 | there any other issues? |
Subject | Author |
---|---|
Re: [gentoo-user] Risks of making traceroute suid root | "J. Roeleveld" <joost@××××××××.org> |
Re: [gentoo-user] Risks of making traceroute suid root | Alan McKinnon <alan.mckinnon@×××××.com> |