Hacker News new | past | comments | ask | show | jobs | submit login

Lame attempt to find setuid/setgid files which link to an X library:

  find /bin/ /sbin/ /lib* /usr/ /var/ /root /home -type f \( -perm -4000 -o -perm -2000 \) -exec /bin/sh -c 'ldd {} | grep -q X && echo exists in {}' \;
Tools that have to read the shadow file (like xlock and xscreensaver) are sometimes setuid root. Apparently this is not necessary though: http://www.shmoo.com/mail/bugtraq/nov98/msg00087.html (My slack box is set up this way)

kppp is setuid root to perform operations only root can do, but supposedly does it in a thread separate from GUI operations. Perhaps Linux Capabilities could be used instead and setuid can finally be thrown out the window?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: