| To: | linux-xfs@xxxxxxxxxxx |
|---|---|
| Subject: | Re: [bug report]: chown(2) implementation in xfs is broken |
| From: | Ethan Benson <erbenson@xxxxxxxxxx> |
| Date: | Sun, 6 Jul 2003 21:33:11 -0800 |
| In-reply-to: | <Pine.LNX.4.56.0307070055520.11005@zen.canint.timetraveller.org> |
| Mail-copies-to: | nobody |
| Mail-followup-to: | linux-xfs@xxxxxxxxxxx |
| References: | <7kadbrchcp.fsf@greenplant.dot> <3F08C005.3070706@linux-sxs.org> <Pine.LNX.4.56.0307070055520.11005@zen.canint.timetraveller.org> |
| Sender: | linux-xfs-bounce@xxxxxxxxxxx |
| User-agent: | Mutt/1.3.28i |
On Mon, Jul 07, 2003 at 01:02:08AM -0400, Robert Brockway wrote: > This is a security issue if anyone is using unix permissions to restrict > execution _from_ a subset of users. This is unusual but I've seen it > done. > > zen:~$ cat ./testfile > #!/bin/bash > > echo "I'm executing!" > > zen:~$ ls -l testfile > ----r-xr-x 1 robert users 46 Jul 7 00:52 testfile* > > zen:~$ ./testfile > bash: ./testfile: Permission denied > > zen:~$ chown root ./testfile my previous mail i missed that you were doing this as non-root. as already reported you need to update your patches, or else sysctl -w fs/xfs/restrict_chown=1 as the default was broken in the first set of 2.4.21 split patches. -- Ethan Benson http://www.alaska.net/~erbenson/
|
| Previous by Date: | Re: [bug report]: chown(2) implementation in xfs is broken, Ethan Benson |
|---|---|
| Next by Date: | Re: Announce: XFS split patches for 2.4.21, Federico Sevilla III |
| Previous by Thread: | Re: [bug report]: chown(2) implementation in xfs is broken, Ethan Benson |
| Next by Thread: | Re: [bug report]: chown(2) implementation in xfs is broken, Robert Brockway |
| Indexes: | [Date] [Thread] [Top] [All Lists] |