Comment 1 for bug 184751

Revision history for this message
Tim Spriggs (tim-tajinc) wrote :

The Debian package intentionally does not set this program as SUID root. Linux platforms allow users to lock small amounts of system memory which makes the SUID bit unnecessary. The closet possibility under Solaris seems to involve RBAC and the proc_lock_memory privilege:

% ppriv -lv proc_lock_memory
proc_lock_memory
        Allows a process to lock pages in physical memory.

Setting this binary as SUID root when upstream does not may be a bad idea since root exploits may not be closely tracked. I am interested to hear if there is a better idea on how to implement this without suid and potentially using Solaris mechanisms like RBAC.