Yehbut: If an attacker can get code execution inside your app, you might think they only have the access of the unprivileged user, but actually they just have to do seteuid(0) and the world is their oyster.
If an attacker can’t get code execution inside your app, then why bother dropping to the unprivileged user at all? (One answer to that may be, because the interactive user can tell the app to read and write files, and you want to limit that to the unprivileged user.)
|
Martin Bonner |
From: openss...@openssl.org <openss...@openssl.org>
On Behalf Of Doug Hardie
Sent: 09 April 2026 01:40
To: Seo Suchan <tjt...@gmail.com>
Cc: openss...@openssl.org
Subject: [EXTERNAL] Re: Using certificates and keys from a list
> On Apr 8, 2026, at 16: 37, Seo Suchan <tjtncks@ gmail. com> wrote: > > Wouldn't it defeat perpose of dropping privilege in first place if code can call function to raise its privilege back to root? > > > On 2026년 4월 9일
--
You received this message because you are subscribed to the Google Groups "openssl-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to openssl-user...@openssl.org.
To view this discussion visit https://urldefense.com/v3/__https://groups.google.com/a/openssl.org/d/msgid/openssl-users/17570E38-919A-47D5-8DA0-53248D5DD490*40sermon-archive.info__;JQ!!FJ-Y8qCqXTj2!cOjW3cavmIqGSZDMJlh9jjTyLtoxc4ayzsyY5HoiOn6iLZp33GZ8kvjRuQfhwYPopJHSNzhFw7gyfh8$.