[PATCH] Hal privilige seperation
Artem Kachitchkine
Artem.Kachitchkin at Sun.COM
Fri Jan 20 13:48:46 PST 2006
>>if hald regained its privileges temporarily before exec'ing
>>an addon and dropping them immediately after?
>
> This sounds pretty dangerous; what if I somehow inject code into the
> hald process.. then I can become root?
If anyone could inject code into hald, we'd be screwed in many other
ways :) Kernel does not allow unprivileged users to trace/debug/modify
setuid processes - see ptrace(2) man page.
-Artem.
More information about the hal
mailing list