User: Password:
Subscribe / Log in / New account

suid-binary vulnerabilities

suid-binary vulnerabilities

Posted Oct 28, 2010 13:31 UTC (Thu) by michaeljt (subscriber, #39183)
In reply to: suid-binary vulnerabilities by cesarb
Parent article: Two glibc vulnerabilities

> Or even better, do not use setuid at all.
> For instance, imagine if ping, instead of being setuid, called into dbus to load a helper daemon, and that helper daemon did all the actions which need root (in this example, sending pings).

Actually a clean environment was the main point of what I suggested above - i.e. using a setuid loader which can clean the environment (not just the environment as in setenv of course) before it loads your privileged binary. My worry with using dbus for this is that it requires a sizeable piece of infrastructure to be present and running properly in order to start your binary, which is fine for desktop use, but may not be appropriate for all situations.

(Log in to post comments)

Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds