Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I adopted a yellowdog linux system where ALL USERS have access to files owned by root, yes that means they have their way with the systems files, navigate just about anywhere, it's a huge security problem. One other clue is that although they can edit files owned by root , they can not run root commands with the full path specified (such as mount, or visudo).
These root owned files have default permission and nobody else is allowed to modify them (i.e. rwx------ root root)
I've checked the ususal places..
- /etc/group to make sure nobody is in the root group,
- checked to make sure nobody should have uid=0 that shouldn't have it
- verified there were no /etc/sudoers entries that allowed root access
Does anybody have any ideas what could be causing this? Could it be some PAM configuration file? ACL's?
What program are you using to see that all users can access root's files? Is it owned by root and have it's st user id or set group id bit set? If so, there's your problem: run
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.