tech-security archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: hardlinks to setuid binaries
Date: Fri, 25 Mar 2022 09:37:38 -0400
From: Jan Schaumann <jschauma%netmeister.org@localhost>
Message-ID: <20220325133738.GS1131%netmeister.org@localhost>
| Now the sysadmin updates the sudo package, fixing the
| vulnerability, but your ~/.sudo remains vulnerable.
It depends how the update is done. unlink old, install new,
will have that effect, but chmod 0 old, unlink old, install
new does not, nor does cp new old (in all cases, with
needed chown, chmod, etc, done after the binary update as well).
The link isn't the real problem, but like a lot of things, it is
easier to place blame where it doesn't belong rather than
accept it where it does.
kre
Home |
Main Index |
Thread Index |
Old Index