mirror of
https://github.com/sudo-project/sudo.git
synced 2025-08-31 06:15:37 +00:00
Add intercept_allow_setid sudoers option, disabled by default.
With this change, a shell in intercept mode cannot run a setuid or setgid binary by default. On most systems, the dynamic loader will ignore LD_PRELOAD for setuid/setgid binaries such as sudo which would effectively disable intercept mode.
This commit is contained in:
@@ -593,6 +593,10 @@ struct sudo_defs_types sudo_defs_table[] = {
|
||||
"intercept_authenticate", T_FLAG,
|
||||
N_("Subsequent commands in an intercepted session must be authenticated"),
|
||||
NULL,
|
||||
}, {
|
||||
"intercept_allow_setid", T_FLAG,
|
||||
N_("Allow an intercepted command to run set setuid or setgid programs"),
|
||||
NULL,
|
||||
}, {
|
||||
NULL, 0, NULL
|
||||
}
|
||||
|
Reference in New Issue
Block a user