Comment by chuso
9 hours ago
It's the same with Gentoo, setuid binaries are installed without read permission.
But modifying a setuid binary is just the demo exploit that was published with the vulnerability disclosure. The vulnerability actually allows modifying four bytes in any readable file. That means system configuration files, other binaries intended to be run by root, libraries... It's not limited to modifying setuid binaries.
No comments yet
Contribute on Hacker News ↗