Subject: Re: misc/2634: /usr/sbin/chroot is a bogon
To: None <douzzer@mit.edu>
From: Rob Healey <rob-healey@norstar.com>
List: current-users
Date: 07/16/1996 09:43:40
>
> >Number: 2634
> >Category: misc
> >Synopsis: /usr/sbin/chroot is doomed
> >Confidential: no
> >Severity: critical
> >Priority: medium
> >Responsible: misc-bug-people (Misc Bug People)
> >State: open
> >Class: sw-bug
> >Submitter-Id: net
> >Arrival-Date: Tue Jul 16 02:35:00 1996
> >Last-Modified:
> >Originator: Daniel G. Pouzzner
> >Organization:
> just me
> >Release: 1.2A
> >Environment:
> >Description:
> hey guys, /usr/sbin/chroot can not possibly work out.
> if it ever leaves experimental status and goes setuid in a release,
> here is what will happen:
>
> -hacker would find a setuid-root program on a partition he has write
> on.
Why would it go suid? In all the other OS's I checked chroot is NOT suid
and it makes no sense to do so. chroot is for use by root privleged
programs, if a hacker could use it effectively then they already have root
and all is lost anyhow!
-Rob