Bugzilla – Bug 1213490
security enhancement: no setuid
Last modified: 2023-07-19 14:42:23 UTC
The way ALP is setting this in the config.sh is still broken, need to investigate consequences and if this is still the case. +++ This bug was initially created as a clone of Bug #1171174 +++ setuid binaries are a potential attack vector for privilege escalation. MicroOS with it's limited scope has chance to close that hole by default and not ship any binaries with elevated privileges by default. Ie set the default level to "paranoid". This will prevent unprivileged (system) users from potentially exploiting - shadow suite tools like passwd, chsh etc - pam helpers unix{,2}_chkpwd - wall, write - clockdiff, ping - dbus-daemon-launch-helper - su - sudo - mount