Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Hi,
while trying to fix #4 I looked for environment variable preserving when executing with suid, and found there are actually vulnerabilities when doing system calls in a program with suid.
http://techblog.rosedu.org/exploiting-environment-variables.html
and for a more recent
https://www.hackingarticles.in/linux-privilege-escalation-using-path-variable/
this line https://github.com/shadow-robot/ethercat_grant/blob/kinetic-devel/src/ethercat_grant.cpp#L27 carries the potential risk even if I did not manage to reproduce the exploit (not sure what protects this yet), I think it would not be harmful to change the cp to its full linux path /bin/cp to avoid the PATH exploit