Re: sudo and changes in packaging guidelines

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Apr 13, 2012 at 2:16 PM, Frank Ch. Eigler <fche@xxxxxxxxxx> wrote:
>
> ajax wrote:
>
>> [...]
>>> If this is meant to cover administrative binaries that have no
>>> privilege escalation pieces of their own, merely run by root, then
>>> what makes them different from any other /bin/* program that a root
>>> process might invoke?
>>
>> It's not meant to cover that.  That phrasing is meant to cover system
>> components like init that do not function _unless_ run as uid 0.
>
> OK.  Can you point to an attack scenario against such binaries that
> would not also apply against some non-uid0-only binary that root
> may incidentally run?

The intent wasn't to imply that these were the only binaries that
would benefit from this protection, just to point out that this is a
good idea and mandate it for a set of critical binaries without
forcing it distro-wide, which would apply it to binaries that might
not benefit from and needlessly suffer a performance hit or build
failure.

-J

> - FChE
> --
> devel mailing list
> devel@xxxxxxxxxxxxxxxxxxxxxxx
> https://admin.fedoraproject.org/mailman/listinfo/devel



-- 
http://cecinestpasunefromage.wordpress.com/
------------------------------------------------
in your fear, seek only peace
in your fear, seek only love

-d. bowie
-- 
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux