Re: More PATH fallout. Who decided this was a good idea?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Saturday 06 December 2008 13:28:44 Callum Lerwick wrote:
> Furthermore, we're supposedly gaining security by preventing
> *unprivileged* user accounts from executing usermod, yet an ACTUAL
> compromised scenario, like oh say breaking into root with a privilege
> escalation vulnerability and modifying passwd and shadow directly with
> kernel syscalls, goes unaudited?

No one ever said that.


> Am I the only one who thinks this security model is mindbogglingly
> broken and nothing more than security masturbation?

I think you aren't looking at all the pieces to see how it fits together.


> If you're not auditing at a lower level than executing /bin/usermod, you
> are DOING IT WRONG period.

That is being audited at a lower level, too.

-Steve

-- 
fedora-devel-list mailing list
fedora-devel-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-devel-list

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux