Skip to Content
Security Strategies in Linux Platforms and Applications, 3rd Edition
book

Security Strategies in Linux Platforms and Applications, 3rd Edition

by Ric Messier, Michael Jang
October 2022
Intermediate to advanced
500 pages
19h 57m
English
Jones & Bartlett Learning
Content preview from Security Strategies in Linux Platforms and Applications, 3rd Edition

Regular and Special Permissions

Linux files and directories have a user and a group owner. Permissions are split into three groups: the user who owns the file, the users in the group that owns the file, and all other users.

Regular permissions are read, write, and execute. Special permissions go beyond execute bits and can extend the executable permissions. In general, these special permissions, especially the set user ID (SUID) bit, may be a security risk. (The SUID bit is a special permission that allows others to execute the given file with the rights of the user owner of the file.) If there’s a binary that’s vulnerable to the ptrace system call, however, the SUID or SGID bit may stop that system call in its tracks, preventing an unauthorized ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Red Hat RHCSA 8 Cert Guide: EX200, 2nd Edition

Red Hat RHCSA 8 Cert Guide: EX200, 2nd Edition

Sander van Vugt
Theoretical Cybersecurity: Principles and Advanced Concepts

Theoretical Cybersecurity: Principles and Advanced Concepts

Jacob G. Oakley, Michael Butler, Wayne York, Matthew Puckett, J. Louis Sewell
Three Essentials for Agentic AI Security

Three Essentials for Agentic AI Security

Paolo Dal Cin, Daniel Kendzior, Yusof Seedat, Renato Marinho

Publisher Resources

ISBN: 9781284255881