Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 4 Nov 1999 09:23:15 +1100
From:      Peter Jeremy <jeremyp@gsmx07.alcatel.com.au>
To:        Robert Watson <robert+freebsd@cyrus.watson.org>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: Examining FBSD set[ug]ids and their use
Message-ID:  <99Nov4.091750est.40370@border.alcanet.com.au>
In-Reply-To: <Pine.BSF.3.96.991103122522.35508K-100000@fledge.watson.org>
References:  <14367.64514.294218.824898@anarcat.dyndns.org> <Pine.BSF.3.96.991103122522.35508K-100000@fledge.watson.org>

next in thread | previous in thread | raw e-mail | index | archive | help

On 1999-Nov-04 04:29:38 +1100, Robert Watson wrote:
>However, I don't like that /usr/bin/uustat is still owned by UUCP, and
...
>Same goes for man -- /usr/bin/man is owned by uid man, so anyone who
>breaks the manpage sandbox can modify it, and abscond with the privileges
>of any user running man.

Another option (at least for us) is to mark them system immutable
(schg).  That stops them being modified by their owner (though it
is more a work-around than a real fix).

>  Man should really use a gid, not a uid, so that
>the man binary doesn't have to by writable by the sandbox.

In this case, this would be a reasonable change, and I can't see any
immediate problems.

Peter


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?99Nov4.091750est.40370>