GreenLake Administration
Operating System - HP-UX
1852235
Members
5508
Online
104065
Solutions
Forums
Categories
Company
Local Language
back
Forums
Discussions
Knowledge Base
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Forums
Discussions
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-03-2004 06:14 AM
11-03-2004 06:14 AM
suid bit
Why is the suid bit enabled for these programs? Would any user other than root need to run these?
/sbin/lvchange.run
/sbin/lvmerge
/sbin/lvsplit
/sbin/lvsync
/nomwcsyncd
/sbin/vgsync
Thanks
/sbin/lvchange.run
/sbin/lvmerge
/sbin/lvsplit
/sbin/lvsync
/nomwcsyncd
/sbin/vgsync
Thanks
3 REPLIES 3
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-03-2004 06:31 AM
11-03-2004 06:31 AM
Re: suid bit
Hi Roger,
You can ignore the SETUID bit on these programs. The programs has internal checks to check for the real UID of the user executing the file even though SETUID has been set.
Infact, all the LVM commands are hard linked to the same binary - /sbin/lvchange. It is just the name of the file that differs. interesting.. isn't it ?
- Sundar
You can ignore the SETUID bit on these programs. The programs has internal checks to check for the real UID of the user executing the file even though SETUID has been set.
Infact, all the LVM commands are hard linked to the same binary - /sbin/lvchange. It is just the name of the file that differs. interesting.. isn't it ?
- Sundar
Learn What to do ,How to do and more importantly When to do ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-03-2004 06:32 AM
11-03-2004 06:32 AM
Re: suid bit
They need to (as most other system level commands) since they access, modify or update files that are protected and must be secured.
Hakuna Matata.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-03-2004 06:43 AM
11-03-2004 06:43 AM
Re: suid bit
Just to make sure you are not mislead - even if the SUID bit is not set and if the root runs the program, the process created can bypass all the access permission settings.
I cannot tell you why SUID is set for the lv* commands, but I can tell you it is not a security risk since LVM commands checks the REAL UID of the user before executing the operation.
So , even if a non-root user executes lvlnboot, for example, the effective UID of the process will be 0 but REAL UID of the process will still be that of the user's UID and thus the user will not be allowed to continue.
I cannot tell you why SUID is set for the lv* commands, but I can tell you it is not a security risk since LVM commands checks the REAL UID of the user before executing the operation.
So , even if a non-root user executes lvlnboot, for example, the effective UID of the process will be 0 but REAL UID of the process will still be that of the user's UID and thus the user will not be allowed to continue.
Learn What to do ,How to do and more importantly When to do ?
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
Company
Events and news
Customer resources
© Copyright 2026 Hewlett Packard Enterprise Development LP