mirror of
https://github.com/sudo-project/sudo.git
synced 2025-08-22 09:57:41 +00:00
Add warning about writable directories and sudo/sudoedit.
This commit is contained in:
parent
796911b3fa
commit
c12dd68d1e
14
doc/sudo.cat
14
doc/sudo.cat
@ -433,6 +433,18 @@ SSEECCUURRIITTYY NNOOTTEESS
|
||||
environment variable is _n_o_t modified and is passed unchanged to the
|
||||
program that ssuuddoo executes.
|
||||
|
||||
Users should not be granted ssuuddoo privileges to execute files that are
|
||||
writable by the user or that reside in a directory that is writable by
|
||||
the user. If the user can modify or replace the command there is no way
|
||||
to limit what additional commands they can run. Likewise, users should
|
||||
not be granted ssuuddooeeddiitt permission to edit a file that resides in a
|
||||
directory the user has write access to. A user with directory write
|
||||
access could replace the legitimate file with a link to some other,
|
||||
arbitrary, file. Starting with version 1.8.15, ssuuddooeeddiitt will refuse to
|
||||
open a symbolic link unless the security policy explicitly permits it.
|
||||
However, it is still possible to create a hard link if the directory is
|
||||
writable and the link target resides on the same file system.
|
||||
|
||||
Please note that ssuuddoo will normally only log the command it explicitly
|
||||
runs. If a user runs a command such as sudo su or sudo sh, subsequent
|
||||
commands run from that shell are not subject to ssuuddoo's security policy.
|
||||
@ -592,4 +604,4 @@ DDIISSCCLLAAIIMMEERR
|
||||
file distributed with ssuuddoo or http://www.sudo.ws/license.html for
|
||||
complete details.
|
||||
|
||||
Sudo 1.8.15 August 6, 2015 Sudo 1.8.15
|
||||
Sudo 1.8.15 August 7, 2015 Sudo 1.8.15
|
||||
|
@ -21,7 +21,7 @@
|
||||
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force
|
||||
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
|
||||
.\"
|
||||
.TH "SUDO" "8" "August 6, 2015" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
|
||||
.TH "SUDO" "8" "August 7, 2015" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
|
||||
.nh
|
||||
.if n .ad l
|
||||
.SH "NAME"
|
||||
@ -869,6 +869,25 @@ modified and is passed unchanged to the program that
|
||||
\fBsudo\fR
|
||||
executes.
|
||||
.PP
|
||||
Users should not be granted
|
||||
\fBsudo\fR
|
||||
privileges to execute files that are writable by the user or
|
||||
that reside in a directory that is writable by the user.
|
||||
If the user can modify or replace the command there is no way
|
||||
to limit what additional commands they can run.
|
||||
Likewise, users should not be granted
|
||||
\fBsudoedit\fR
|
||||
permission to edit a file that resides in a directory the user has
|
||||
write access to.
|
||||
A user with directory write access could replace the legitimate
|
||||
file with a link to some other, arbitrary, file.
|
||||
Starting with version 1.8.15,
|
||||
\fBsudoedit\fR
|
||||
will refuse to open a symbolic link unless the security policy
|
||||
explicitly permits it.
|
||||
However, it is still possible to create a hard link if the directory
|
||||
is writable and the link target resides on the same file system.
|
||||
.PP
|
||||
Please note that
|
||||
\fBsudo\fR
|
||||
will normally only log the command it explicitly runs.
|
||||
|
@ -19,7 +19,7 @@
|
||||
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force
|
||||
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
|
||||
.\"
|
||||
.Dd August 6, 2015
|
||||
.Dd August 7, 2015
|
||||
.Dt SUDO @mansectsu@
|
||||
.Os Sudo @PACKAGE_VERSION@
|
||||
.Sh NAME
|
||||
@ -804,6 +804,25 @@ modified and is passed unchanged to the program that
|
||||
.Nm
|
||||
executes.
|
||||
.Pp
|
||||
Users should not be granted
|
||||
.Nm
|
||||
privileges to execute files that are writable by the user or
|
||||
that reside in a directory that is writable by the user.
|
||||
If the user can modify or replace the command there is no way
|
||||
to limit what additional commands they can run.
|
||||
Likewise, users should not be granted
|
||||
.Nm sudoedit
|
||||
permission to edit a file that resides in a directory the user has
|
||||
write access to.
|
||||
A user with directory write access could replace the legitimate
|
||||
file with a link to some other, arbitrary, file.
|
||||
Starting with version 1.8.15,
|
||||
.Nm sudoedit
|
||||
will refuse to open a symbolic link unless the security policy
|
||||
explicitly permits it.
|
||||
However, it is still possible to create a hard link if the directory
|
||||
is writable and the link target resides on the same file system.
|
||||
.Pp
|
||||
Please note that
|
||||
.Nm
|
||||
will normally only log the command it explicitly runs.
|
||||
|
Loading…
x
Reference in New Issue
Block a user