Le 29/07/2015 16:35, a...@gulbrandsen.priv.no a écrit :
Every last problem of sudo is taken seriously? Did you know that if someone has limited access, e.g. the right to install standard packages, then it is easy to leverage that to get complete access. Various packages run programs in $PATH as root, Firefox comes to mind, so just prepare $PATH and sudo apt-get install firefox.

Sudo leaves the user's $PATH and the rest is just a matter of finding the right exploit.

Was open for years, may still be open.

Arnt

I don't understand the preventions against sudo. It is just up to the administrator to take care, like for everything.

Wether execution of the command is allowed by sudo, by a setuid bit or by policykit does not change the result. Sudo is simply the most versatile method to allow/disallow actions, IMHO far easier to configure than policykit. Don't forget that allowed commands may (should) be specified with their absolute path, therefore bypassing PATH. It is better than having a specialized daemon for this and that, because it keeps everything configured in one well known file.

In the case of mounting usb sticks, this applies to a personal computer, where the owner is also the administrator. For conveniency, a limited list of actions may be allowed without password, like mounting a usb key.

    Didier

_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to