Hi.

On Tue, 24 Dec 2013 08:57:36 +0100
Raffaele Morelli <raffaele.more...@gmail.com> wrote:

> Keep in mind that if a php script is owned by root user and there's a
> security hole in it, an attacker can easily access every block of your file
> system.

Executing root-owned php script by www-data user will give you a process
which is owned by www-data.
Executing root-owned SUID php script by www-data user will give you a
process (surprise!) which is owned by www-data.

You should try it yourself sometimes.

Now, if disks' block devices are owned by www-data too that really can
be a problem. Or if disks' block devices had permissions that allowed
www-data to read from them. Since in stock Debian configuration
there are no such block or char devices - there is no problem.

Reco


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20131224120653.9b50357fb5cab3c9742a7...@gmail.com

Reply via email to