Questions tagged [unix]

Unix is a family of multiuser, multitasking operating system that is widely used in workstations, servers and embedded devices. The best-known Unix variant is Linux.

Unix is a family of multiuser, multitasking operating systems found on many servers, workstations, network equipment and other embedded devices. Unix variants include , , , , and more. Use the tag for questions that are about Unix-like systems in general; if your question is about a specific operating system (Linux, OpenBSD, …), use the tag for that system. For functional questions (“How do I use this tool which is not specifically a security tool?”), try asking on our sister site Unix & Linux.

In the core Unix security model, roles are described in terms of users (who are typically either physical users or system services) and groups. The permissions of an application are those of the user executing it. Some programs run with elevated privileges through the setuid/setgid mechanism.

Resources such as data files, programs and devices are accessed through files. In the traditional Unix model, each file has an owner and group, and the owner, group and others are granted separate permissions (read/write/execute). Many modern Unix systems provide access control lists and other extensions to the basic model.

153 questions
5
votes
1 answer

Always setgroups before setuid?

On GNU/Linux systems that are build using RPM packages, the rpmlint utility complains about programs that don't call setgroups before setuid. The idea is that before dropping privileges, a process should also drop the list of supplementary group…
Kaz
  • 2,305
  • 17
  • 17
3
votes
4 answers

What RHSA, RHEA and RHBA stands for in the RedHat Erratas?

Do you know what does RHSA, RHEA and RHBA stands for in RedHat Errata ?
Vladimir Leiv
  • 907
  • 3
  • 8
  • 14
3
votes
3 answers

Are environment variables entered *directly* before a command visible to other users?

UPDATE: I know that environment variables are generally secure, and am familiar with this question. My question is can other users see them if they are entered as part of a command (same line, no semi-colon), seeing as command line options are not…
Neil McGuigan
  • 3,429
  • 1
  • 18
  • 22
2
votes
2 answers

Sniff plaintext password written in /tmp directory

I was recently reading about Ansible and the way it manages the sudo passwords. More specifically: When using become_user to a user other than root, the module arguments are briefly written into a random tempfile in /tmp. These are deleted…
bergercookie
  • 143
  • 4
1
vote
0 answers

What is the "crafted DBGCMD_LQUERYLV" in CVE-2014-8904

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8904 lquerylv in cmdlvm in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x allows local users to gain privileges via a crafted DBGCMD_LQUERYLV environment-variable value. But it doesn't…
whoisthesomeone
  • 541
  • 1
  • 4
  • 3
1
vote
3 answers

Grep Commands with User Input

I'm curious if there is a way to make user input safe for grep commands. I have a search box that should allow an end user to search a directory recursively for files containing a string. I could accomplish this solely with PHP but grep should be…
FamousAv8er
  • 309
  • 2
  • 10
1
vote
1 answer

What is the rationale for calling setgroups on a list of length one?

The Secure Programming Cookbook for C and C++ says that: "Ancillary groups are inherited by a process from its parent process, and they can only be altered by a process with superuser privileges. Therefore, if a process with superuser privileges is…
Kaz
  • 2,305
  • 17
  • 17