On 10/30/23 19:11, Todd Zullinger wrote:
Samuel Sieb wrote:
On 10/30/23 18:15, ToddAndMargo via users wrote:
Hi All,

It seems to me that since /etc/sudoers is visible from a
standard user account, that all a bad guy has to do is
cat the file, find some program that is elevated, then
overwrite that program with his evil deeds, and boom,
you are hacked.

Am I missing something?

If the bad guy can overwrite the executable, then you have a bigger security
problem.

True.  But also, /etc/sudoers should not be readable by
anyone other than root:

On f37:

     $ rpm -qlv sudo | grep /etc/sudoers$
     -r--r----- 1 root root  4375 Mar  1  2023 /etc/sudoers

If you have edited the file manually, your editor may have
screwed up the mode.  You should use visudo to edit the
file, generally.

Hi Todd,

# cat /etc/redhat-release
Fedora release 38 (Thirty Eight)

# ls -al /etc/sudoers
-r--r-----. 1 root root 4717 Oct 30 16:24 /etc/sudoers

$ cat /etc/sudoers
cat: /etc/sudoers: Permission denied

I wonder why I thought I could see it from a user's account?

Thank you!

-T

I have used vi to edit sudoers for years.  Visudo is
a pain in the ...

_______________________________________________
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to