Security implications of allowing init to re-exec from another path
Hello security experts.
In #345741 the submitter has requested that /sbin/init be enhanced
such that it can be re-executed from another path. The idea is that
"telinit -e INIT_PROG=/path/to/other/init" could be done prior to
"telinit u".
Reasons for introducing this feature are given in the discussion of
#345741.
Obviously not just anyone can do "telinit -e". So it sounds safe.
Nevertheless the sysvinit maintainers thought it would be a good idea
to ask here whether anyone sees any security problems arising from
this feature.
--
Thomas Hood
Reply to: