Bug 32618
Summary: | /usr/bin/gpg requires SETUID root to use secure memory | ||
---|---|---|---|
Product: | [Retired] Red Hat Linux | Reporter: | Christian Conkle <christian> |
Component: | gnupg | Assignee: | Nalin Dahyabhai <nalin> |
Status: | CLOSED WONTFIX | QA Contact: | Aaron Brown <abrown> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 7.0 | CC: | dr |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | i386 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2001-03-22 17:29:09 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Christian Conkle
2001-03-22 01:51:06 UTC
Hm, I tend to agree, IF the codepath up to dropping root privs is sufficiently convincing. Use the --no-secmem-warning option to disable this message. Given the choice between a hypothetical code vulnerability and the possibility of a malicious party reading sensitive data from your swap partition, we choose to ship without the setuid bit set. |