Home | History | Annotate | Download | only in security

Lines Matching full:suid

200 <h3 id="suid-files">SUID files</h3>
207 <li>SUID processes <strong>must not</strong> provide a shell or backdoor that can be used to
209 <li>SUID programs <strong>must not</strong> be writable by any user.</li>
210 <li>SUID programs <strong>should</strong> not be world readable or executable. Create a
211 group, limit access to the SUID binary to members of that group, and place any
212 applications that should be able to execute the SUID program into that
214 <li>SUID programs are a common source of user "rooting" of devices. To reduce
215 this risk, SUID programs <strong>should not</strong> be executable by the shell
219 <p>The CTS verifier has been expanded with an informational test that lists SUID