[Prev][Next][Index][Thread]
Security Hole in Executor/Linux-SVGALIB
It looks to me like setting up Executor/Linux-SVGALIB as setuid root is a
wide open security hole. All hard drive access is done as root. This
includes things like writing /etc/passwd:). I don't know if there is any
easy way around this, short of deciding to give a trusted group of users
(who are allowed to use Executor) root access or alternatively leaving
everything wide open to anyone who can get to the console.
The other interesting problem is that running Executor/Linux-SVGALIB ends up
resetting the owners on a bunch of files, which means that you pretty much
have to run Executor/Linux-X as root in order to save changes to the Browser
and the like.
--Toby Everett