Disabling setuid: How Linux's no_new_privs Feature Reshapes Privilege Escalation Defenses
Linux distributions are eliminating dangerous setuid binaries using the kernel's no_new_privs flag—a security hardening technique that prevents privilege escalation via vulnerable executables. This deep dive explores the technical implementation replacing tools like sudo and passwd with systemd services and IPC, while confronting remaining challenges in container environments.