[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: GNUstep.sh / env sanity patches

From: Rogelio Serrano
Subject: Re: GNUstep.sh / env sanity patches
Date: Fri, 20 Aug 2004 17:39:22 +0800

On 2004-08-20 17:34:53 +0800 Richard Frith-Macdonald <address@hidden> wrote:

While I agree with you about setuid root executables,  I have
seen people talking about wanting to run things as root.
I have also found it convenient to have executables setuid to an unprivileged user account, where I want different people to be able to work with a common group account. ... this has the same security issues except that exploits run with that accounts access rather than root.

In my system root has no superpriviledges. And i have no setuid execs at all. I can even do rm -rf /* as root and it will be denied.

reply via email to

[Prev in Thread] Current Thread [Next in Thread]