On 10/30/23 19:11, Todd Zullinger wrote:
Samuel Sieb wrote:
On 10/30/23 18:15, ToddAndMargo via users wrote:
Hi All,
It seems to me that since /etc/sudoers is visible from a
standard user account, that all a bad guy has to do is
cat the file, find some program that is elevated, then
overwrite that program with his evil deeds, and boom,
you are hacked.
Am I missing something?
If the bad guy can overwrite the executable, then you have a bigger security
problem.
True. But also, /etc/sudoers should not be readable by
anyone other than root:
On f37:
$ rpm -qlv sudo | grep /etc/sudoers$
-r--r----- 1 root root 4375 Mar 1 2023 /etc/sudoers
If you have edited the file manually, your editor may have
screwed up the mode. You should use visudo to edit the
file, generally.
Hi Todd,
# cat /etc/redhat-release
Fedora release 38 (Thirty Eight)
# ls -al /etc/sudoers
-r--r-----. 1 root root 4717 Oct 30 16:24 /etc/sudoers
$ cat /etc/sudoers
cat: /etc/sudoers: Permission denied
I wonder why I thought I could see it from a user's account?
Thank you!
-T
I have used vi to edit sudoers for years. Visudo is
a pain in the ...
_______________________________________________
users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue