Is privilege escalation possible if Attacker can force Victim to write to symlink set by Attacker?

I am sure others have analyzed this scenario before, but I cannot find a source.
Assume:

Attacker has an account on the system
Victim has an account on the system
Victim runs MyProg
There is a bug in MyProg: It creates a temporary file, b… Continue reading Is privilege escalation possible if Attacker can force Victim to write to symlink set by Attacker?

Linux Fu: File Aliases, Links, and Mappings

Have you heard it said that everything in Linux is a file? That is largely true, and that’s why the ability to manipulate files is crucial to mastering Linux Fu.

One thing that makes a Linux filesystem so versatile is the ability for a file to be many places at once. It boils down to keeping the file in one place but using it in another. This is handy to keep disk access snappy, to modify a running system, or merely to keep things organized in a way that suits your needs.

There are several key features that lend to …read more

Continue reading Linux Fu: File Aliases, Links, and Mappings

In Samba, what is the security difference between "wide links" and "insecure wide links"?

I think I need to allow wide links of some kind, to handle a set of mountpoints in Samba.

The actual scenario is that I want to make a dataset’s /.zfs/snapshot (and some of its descendant individual snaps and some of their… Continue reading In Samba, what is the security difference between "wide links" and "insecure wide links"?