Permanently allow root access

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Hey,

I cannot reproduce your exploit.

Using the stock sudoers file only with the modification

%sudo ALL=(ALL) ALL

and the place for running X applications as root is commented out.

## Run X applications through sudo; HOME is used to find the
## .Xauthority file.  Note that other programs use HOME to find
## configuration files and this may lead to privilege escalation!
# Defaults env_keep += "HOME"

cheers,

Heiko

Am 03.02.2014 11:40, schrieb Martti Kühne:
Hey guys

I'll just throw my more local (than probably necessary) .bashrc
function in here...

sudo ()
{
     local env;
     if [[ -n "$DISPLAY" ]]; then
         command sudo "XAUTHORITY=$HOME/.Xauthority" "$@";
     else
         command sudo "$@";
     fi
}

You don't give up on X11 cookies, you don't need to touch pam and can
go on hoping it works in your favor, and thridly, there's even a
mention of .Xauthority in the stock sudoers file, so, you'll never
find where these things are set up on a running system anyway...

cheers!
mar77i



[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Share Photos]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]
  Powered by Linux