Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

suid does not detect if it is traced #13

Open
hilbix opened this issue Apr 6, 2020 · 1 comment
Open

suid does not detect if it is traced #13

hilbix opened this issue Apr 6, 2020 · 1 comment

Comments

@hilbix
Copy link
Owner

hilbix commented Apr 6, 2020

seteuid() no more works if a process is ptrace()d, see CVE-2003-0127

suid perhaps should detect that situation and do something helpful.

@hilbix
Copy link
Owner Author

hilbix commented Aug 15, 2023

FWIW I want to be able to strace programs which run under suid control.

For now what I do is to put some strace right into suid.conf.

However it would be convenient if there would be some way to apply the strace (and things like ltrace tricks based on LD_PRELOAD) on-demand and not by editing some configuration file. But in that case the caller must have the right permissions (either be root or the destination user).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant