Skip to Content [alt-c]

Comment

In reply to Security Pitfalls of setgid Programs

Reader Pi on 2014-03-12 at 03:26:

Except that with (just) setuid the attacker could use "umask 002" and then since the group didn't change, he'll still be able to modify the tmpfile...

The correct way to handle things for any non-god entity is to not use setuid or setgid at all, but rely on sudo instead. That is the proper scrutinizer program that you should use.

Reply

Post a Reply

Your comment will be public. To contact me privately, email me. Please keep your comment polite, on-topic, and comprehensible. Your comment may be held for moderation before being published.

(Optional; will be published)

(Optional; will not be published)

(Optional; will be published)

  • Blank lines separate paragraphs.
  • Lines starting with > are indented as block quotes.
  • Lines starting with two spaces are reproduced verbatim (good for code).
  • Text surrounded by *asterisks* is italicized.
  • Text surrounded by `back ticks` is monospaced.
  • URLs are turned into links.
  • Use the Preview button to check your formatting.