Fact-checked by Grok 2 weeks ago

chown

chown is a command-line utility in operating systems used to change the user ID (owner) and/or group ID of files, directories, and symbolic links. It operates by invoking the underlying chown() , which sets the specified ownership attributes for each operand file. The utility conforms to the POSIX.1-2017 standard, ensuring portability across compliant systems. The basic syntax of chown is chown [options] owner[:group] file..., where owner specifies the new user, group (optional) specifies the new group, and file... lists the targets. Common options include -R for recursive operation on directories, -h to affect symbolic links themselves rather than their targets, and --reference=ref_file to copy ownership from a reference file. In GNU implementations, such as those in Linux distributions via Coreutils, additional features like --from=old-owner allow conditional changes only if the current ownership matches a specified pattern. Executing chown typically requires superuser (root) privileges to change ownership to arbitrary users or groups, though owners can often transfer files to themselves under certain system policies. This command is essential for system administration tasks, such as securing file permissions, managing multi-user environments, and correcting ownership after file transfers or backups. On regular files, chown clears set-user-ID and set-group-ID bits unless executed with sufficient privileges, preventing unauthorized privilege escalation.

Overview

Definition and Purpose

The chown command is a standard utility in operating systems designed to modify the user ID () and group ID (GID) associated with files and directories, thereby altering their ownership attributes. This functionality enables precise control over resource allocation in multi-user environments, where ownership directly influences access rights and security boundaries. In Unix file systems, every file and directory possesses an owner, identified by a , and a primary group, identified by a GID; these identifiers work in conjunction with permission settings to govern operations. Permissions are structured around a triplet model—consisting of read (r), write (w), and execute (x) flags—applied separately to the owner, the owning group, and all other users (often denoted as "others"), ensuring that is granular and contextually . The primary purpose of chown is to allow system administrators to reassign these elements, facilitating the of policies, of administrative tasks, and of organized hierarchies in shared systems. The name chown derives from "change owner," reflecting its core role in file manipulation utilities within environments.

Availability and Platforms

The chown utility is a core component of all POSIX-compliant systems, as defined in the POSIX.1-2017 standard, ensuring its availability on operating systems including various distributions, BSD variants, macOS, and . In environments such as and , chown is provided by coreutils package, which implements the command with extensions beyond the POSIX baseline. BSD systems like include chown as a standard utility in their base system, while macOS, based on (a BSD derivative), offers it natively through its command-line tools. implementations, as documented by , feature chown with CSI-enabled options for internationalization support. On non-Unix platforms, chown is accessible through emulation layers. In Windows environments, it is available via , which provides a Linux-like environment including the full coreutils suite; (via MSYS2) offers a ported version for cross-compilation needs; and (WSL) supports chown directly for file ownership changes within its Linux distributions, with improvements for permission handling since 2018. In embedded systems like , chown is typically provided by , a lightweight implementation of utilities used in resource-constrained environments, though root access may be required for full functionality. Regarding package management, chown is usually installed by default as part of the base system in POSIX-compliant distributions, eliminating the need for separate installation in most cases. On Debian-based systems like , it resides in the coreutils package, which can be explicitly installed or reinstalled using apt install coreutils if removed or in minimal installations. Implementations of chown vary by , with the GNU version from coreutils being the most widely used on ; as of November 2025, the latest stable release is version 9.9.

History

Origins in Unix

The chown command was introduced in Version 7 Unix, released in January 1979 by Bell Laboratories as part of the core file management utilities, including commands such as ls and cp for handling file attributes and operations in a multi-user environment. Developed by Bell Labs researchers Ken Thompson and Dennis Ritchie, chown was created to facilitate secure multi-user file sharing within the original Unix system at AT&T, enabling precise control over file ownership to prevent unauthorized access and support collaborative workflows. In the context of early Unix deployment at research institutions and universities, chown addressed critical needs for resource isolation and collaboration in academic and research computing environments, where multiple users required mechanisms to delineate file access and ownership for efficient shared system usage. The initial implementation was written in and placed in the /bin directory as a standard system utility, with its core functionality—altering file user ownership via the chown —remaining largely unchanged through early commercial Unix such as System III and System V in the early .

Evolution and Standardization

Following its initial development at , the chown utility was adopted and extended in (BSD) Unix during the 1980s, where variants introduced additional functionality such as the -R flag for recursive ownership changes on directories and their contents. The chown utility achieved formal standardization as a required command in POSIX.1-1988 (IEEE Std 1003.1-1988), establishing its core syntax and behavior for portability across systems. Subsequent revisions refined its specification: POSIX.1-2001 (IEEE Std 1003.1-2001) added support for handling s via options like -h, -H, -L, and -P, while clarifying error consequences and group ownership details to improve consistency and application conformance. POSIX.1-2008 (IEEE Std 1003.1-2008) further updated descriptions for -h and -P options, along with synopsis clarifications for the optional -R flag, enhancing error handling and behaviors. Under the GNU project, initiated by in 1983, the chown implementation within GNU Coreutils—developed from the late 1980s onward—introduced enhancements like the --reference option to copy ownership from a specified file and support for numeric user and group IDs, making it the dominant version in Linux distributions. These features expanded usability while maintaining compatibility. The latest Coreutils version 9.9, released on November 10, 2025, includes numerous bug fixes and improvements across utilities such as cp, sort, and split, building on prior releases that addressed security vulnerabilities including heap buffer overflows in tools like split and sort.

Syntax and Options

Basic Syntax

The basic syntax of the chown command follows the form chown [options] owner[:group] file..., where [options] denotes optional flags that alter the operation, owner specifies the new user owner either by username or numeric user ID (UID), [:group] optionally sets the new group owner by group name or numeric group ID (GID) following a colon with no spaces, and file... lists one or more target paths to files or directories. In this structure, the owner parameter precedes the optional group, separated by a colon if both are provided; in , omitting the group after the colon (owner:) results in no change to the group ownership, while in implementations, it sets the group to the new owner's primary group. Multiple targets can be specified as space-separated arguments, allowing simultaneous ownership changes across files. By default, specifying only the owner without a group leaves the existing group ownership intact. Such changes generally require superuser (root) privileges, particularly when altering ownership of files not owned by the invoking user, though system policies may impose additional restrictions on group assignments. On success, chown exits with 0; failure yields a non-zero exit , such as 1 for general errors including permission , with diagnostics output to —common messages include "Operation not permitted" for insufficient privileges.

Key Options and Flags

The chown command supports several key options and flags that allow users to customize its behavior, particularly for handling , symbolic links, and verbose output. These options modify the core syntax to address common use cases in management. Among the primary options, -R or --recursive enables recursive application of changes to a directory and all its contents, including subdirectories, making it essential for bulk operations on hierarchical structures. This option is required by the standard, ensuring portability across compliant systems. For symbolic links, the -h or --no-dereference directs chown to change the of the link itself rather than following it to the target file or , which helps maintain link integrity without altering the referenced object's attributes. Like -R, this option is POSIX-required, providing a standardized way to handle symlinks. In contrast, implementations extend functionality with options like --reference=FILE, which copies the user and group from a specified file to the target, simplifying the replication of permissions without explicitly naming users or groups. Verbose and diagnostic options further enhance usability: -v or --verbose outputs a message for every file processed, aiding in monitoring operations, while -c or --changes provides similar verbosity but only reports files where ownership actually changes, reducing output noise. These are GNU-specific extensions beyond POSIX requirements. Additionally, GNU chown supports --from=old-user[:old-group], an optional flag that conditions changes on the file's current ownership matching the specified old values, useful for targeted updates in scripts. Option parsing in chown follows standard Unix conventions, where short flags (e.g., -R, -v) can be combined into a single argument like -Rv for brevity, while long forms (e.g., --recursive, --verbose) offer clarity in scripts and are not combinable in the same way. mandates support for -R and -h but leaves extensions like those in Coreutils as optional, allowing for implementation-specific enhancements without breaking compatibility.

Usage

Changing User Ownership

The chown command modifies the user ownership of a file or directory by specifying the new owner either as a username or a numeric user ID (UID). When a username is provided, it is resolved to the corresponding UID through the system's password database, primarily consulting the /etc/passwd file and Network Service Switch (NSS) modules for additional sources such as LDAP or NIS. This resolution ensures that the command operates on the actual numeric UID stored in the filesystem, allowing flexibility in specifying ownership without always needing to know the exact UID value. To perform a ownership change, the command must typically be executed by a privileged , such as one running as the root user with the , as non-privileged users cannot alter the owner to a different user. Internally, the chown utility invokes the chown(2) (or variants like fchown or lchown for file descriptors or symbolic links) to effect the change, ensuring atomic updates to the filesystem . This restriction prevents unauthorized escalation of privileges through manipulation. Upon successful execution, the change updates the field in the file's inode, which directly influences standard permission checks for read, write, and execute based on the new owner's privileges. However, if Access Control Lists (ACLs) are present on the file, they remain unaffected by the ownership change and continue to override or supplement the base permissions independently. This separation allows fine-grained access control to persist even after ownership transfers. For combined user and group changes, the syntax extends to include both in a single invocation, such as chown user:group file. Common use cases for changing user ownership include transferring files from one user account to another during administrative tasks, correcting ownership discrepancies after restoring from backups where UIDs may have shifted, and automating user migrations in scripts for system maintenance. For instance, assigning system-wide files to the root user ensures proper security isolation. To verify the ownership change, administrators can use the ls -l command, which displays the file's owner in the long listing format, showing the username or UID alongside permissions and other metadata. If the output reflects the intended new owner, the operation has succeeded; discrepancies may indicate permission denials or resolution failures.

Changing Group Ownership

To change the group ownership of a file using the chown utility, the syntax specifies the group after a colon, either alone or alongside a user. For group-only changes, the command takes the form chown :groupname file, where groupname is the desired group identifier. Alternatively, to set both user and group ownership simultaneously, use chown user:group file. This colon-separated format adheres to the standard and is implemented in systems like Coreutils. Group names in the chown command are resolved to group IDs (GIDs) by consulting the system's group database, typically the /etc/group file on systems. If a symbolic group name is provided, it maps to the corresponding numeric GID listed in the database; alternatively, a numeric GID can be specified directly for precision, such as chown :1001 file, which avoids reliance on name resolution. Changing group ownership requires appropriate privileges: the (root) can always perform the operation on any . For non-root users, the change is permitted only if the user is a member of the target group, as enforced in implementations like Coreutils and kernels. This restriction ensures that group assignments remain secure and aligned with user affiliations. Altering a file's group ownership influences the application of group-level permissions within the standard Unix permission model of rwxrwxrwx, where the middle triplet governs read, write, and execute access for members of the owning group. This is particularly useful for managing shared directories in team environments, allowing collaborative access without altering user ownership or individual permissions. Group changes interact with overall file access controls, potentially enabling or restricting operations based on the caller's group membership. A special case arises when changing ownership to a file's user's primary group without explicitly naming the group: the syntax chown user: file sets the group to the user's group as defined in the group database. This simplifies assignments where the primary group suffices for the intended scenario.

Examples

Simple File Ownership Changes

The chown command enables administrators to modify the of individual files by specifying a new or group, typically requiring elevated privileges such as those provided by on systems like . For instance, to change the owner of a single named document.txt to the alice, the command sudo chown alice document.txt is executed, which updates the file's ID (UID) while leaving the group ID (GID) unchanged. Prior to the change, running ls -l document.txt might display as root:root (indicating root and root group), but afterward, it would show alice:root, confirming the successful transfer of . To assign a specific group to a file without altering the owner, the syntax uses a colon for the group name, as in sudo chown :developers script.sh for the file script.sh. This operation sets the GID to that of the developers group, verifiable via ls -l script.sh, which could shift from root:root to root:developers. Similarly, both and group can be updated simultaneously with sudo chown bob:staff report.pdf, resulting in ls -l report.pdf displaying bob:staff post-execution, assuming the file initially belonged to root:root. Common issues arise when executing these commands without proper privileges; omitting sudo often yields a "Permission denied" error, as only or equivalent can alter ownership of files not owned by the current . Additionally, specifying a nonexistent username or group name, such as an invalid alice user, triggers an "Invalid user" or "Invalid group" error, preventing the operation. These basic file operations form the foundation for more extensive uses, such as on directories.

Directory and Recursive Operations

When changing the ownership of a directory, the chown command targets the directory entry itself without affecting its contents unless specified otherwise. For example, the command sudo chown alice /home/alice/docs sets the user ownership of the /home/alice/docs directory to alice, ensuring that the user has appropriate control over the . To extend ownership changes to an entire directory hierarchy, including all files, subdirectories, and nested contents, the -R or --recursive option must be invoked. This option causes chown to traverse the depth-first, applying the specified owner and group to every item encountered. A representative command is sudo chown -R alice:developers /project, which recursively assigns to user alice and group developers throughout the /project directory and its subtree. Symbolic links present special considerations in recursive operations. By default, chown dereferences symbolic links and alters the of the target files or directories they reference. To instead modify the symbolic link itself—without following it—the -h or --no-dereference option is required, as in sudo chown -hR [alice](/page/Alice) /project, which affects links directly while recursing through the tree. In practical scenarios, such as configuring a after software , recursive adjustment is often necessary to grant the access to document roots. For on systems like , the command sudo chown -R www-data:www-data /var/www/[html](/page/HTML) recursively sets both user and group to www-data, allowing the to read and serve files without permission issues. Recursive operations on extensive directory trees can be resource-intensive and time-consuming, as chown must examine and potentially modify ownership for each file and subdirectory individually; to monitor progress, the --changes option can be added to report only the items whose ownership is actually altered.

System Variations

POSIX Compliance

The chown utility is defined in the POSIX.1 standard as a command for changing the user ID and optionally the group ID of files, with a required syntax of chown [options] owner[:group] file..., where owner and group can be either symbolic names or numeric IDs. Implementations must support the owner[:group] format for specifying ownership changes, the -R option for recursive operation on directory hierarchies, and appropriate error reporting via exit status codes, with numeric IDs being permitted although symbolic names are the primary form. Mandatory behaviors include failure of the operation if the invoking process lacks appropriate privileges (typically ) and the file is not owned by the effective ID of the process, ensuring restrictions on changes. The utility invokes the underlying chown() function, which alters without modifying the file's modification time (mtime) or time (atime), though the status change time (ctime) is updated as a consequence of alteration; no option exists to alter this timestamp behavior. As a standard utility, chown respects the PATH environment variable for its execution location but has no utility-specific variables; resolution of symbolic user and group names relies on system databases such as /etc/passwd and /etc/group, independent of variables like USER or GROUP. POSIX locale environment variables (LANG, LC_ALL, LC_CTYPE, LC_MESSAGES) influence diagnostics and output formatting. Compliance with for chown is verified using test suites provided by The Open Group, such as the VSX-PCTS suite for and Utilities, which exercises required syntax, options, checks, and behaviors across implementations. Any deviations from the standard are documented in the rationale sections of the specifications or implementation conformance statements. Updates to the chown specification include the addition in POSIX.1-2001 (Issue 6) of options -h, -H, -L, and -P to control handling, where -h affects only the symbolic link itself (non-recursive) and -H, -L, -P manage traversal during recursive operations. The POSIX.1-2008 edition (Issue 7) provided clarifications on symlink handling, emphasizing that without these options, chown follows symbolic links to their targets by default.

GNU Coreutils Implementation

The GNU implementation of chown is provided by the Coreutils package, a collection of basic file, shell, and text manipulation utilities developed by the Project. This version extends the standard with additional options, such as --from=old_user:old_group:new_user:new_group, which changes ownership only for files currently owned by the specified old user and group, enabling conditional updates in scripts or bulk operations. Key GNU-specific flags include --preserve-root, which safeguards against inadvertent ownership changes to the (/), even when operating recursively or dereferencing symlinks pointing to it. For symlink handling, the -H option follows command-line symlinks but not others encountered during traversal, -L dereferences all symlinks to affect the targeted files, and -P (the default) avoids dereferencing any symlinks, changing only the link itself. In most distributions, the chown binary is located at /usr/bin/chown and provides diagnostics unique to the , such as detailed error messages for permission failures or invalid user specifications. Compared to BSD variants, chown offers more robust support for the --reference=RFILE option, which copies ownership from a , including handling of numeric IDs and edge cases like non-existent users. As of 9.9, released in November 2025, Coreutils provides the implementation of chown with no major changes to its functionality since 9.5.

Security Considerations

Ownership and Permissions

In operating systems, file ownership plays a central role in managing access permissions, as only the file's owner or a with elevated privileges (such as ) can modify its permission bits using the chmod command. The chown utility facilitates this by allowing the transfer of ownership from one or group to another, thereby shifting control over permission changes to the new owner. This integration ensures that permissions reflect the intended administrative hierarchy, preventing unauthorized alterations to file access rights. When chown is used to alter the owner or group of an executable file, it typically clears the (S_ISUID) and setgid (S_ISGID) bits in the file's mode, particularly for unprivileged users; since version 2.2.13, even the user triggers this clearing behavior to enhance . These special bits allow s to run with elevated privileges (owner's for setuid or group's GID for setgid), so their removal during ownership changes requires careful handling to avoid disrupting applications that rely on such mechanisms, such as tools. In cases where the setgid bit indicates mandatory file locking rather than group execution, it may remain intact. The chown command updates the base ownership attributes (user ID and group ID) of a file or directory, but it does not directly affect Access Control Lists (ACLs) or extended attributes that layer additional permissions on top. , managed via tools like setfacl, enable fine-grained access for specific users or groups beyond the traditional owner-group-others model, and these entries persist after a chown operation, potentially overriding or supplementing the new base permissions. For instance, an granting read access to a non-owner user remains effective even after reassigning the file's primary ownership. Upon creation, a new or in a inherits the effective user ID of the creating as its owner, while the group ownership defaults to the 's effective group ID unless the parent has the setgid bit enabled. With the setgid bit set on a (via chmod g+s), any new or subdirectories created within it inherit the directory's group ownership, promoting consistent group-based access in shared environments like collaborative projects. The setting influences only the initial permission bits (e.g., read, write, execute) of these new objects and does not alter their ownership propagation. Note that chown applied to a affects only the directory itself unless is specified, leaving rules for future creations unchanged. In enterprise environments, the auditd daemon provides capabilities for chown operations to support and auditing. Administrators can configure rules with auditctl to monitor chown system calls, capturing details such as the invoking , target file, and resulting ownership changes in the for forensic or regulatory adherence. This auditing is essential for tracking potential unauthorized ownership modifications in controlled systems.

Potential Risks and Mitigations

Misuse of the chown command can lead to , such as altering the ownership of critical system files like /etc/passwd or /etc/shadow to an untrusted user, granting unauthorized access to sensitive data. The capability CAP_CHOWN, which enables file ownership changes, exacerbates this risk when granted to untrusted processes, allowing attackers to redirect access to privileged resources. Recursive operations with the -R flag amplify exposure, as unintended changes to nested files or directories may propagate ownership modifications to sensitive subpaths, potentially violating access controls. Common attacks include wildcard injection in scripts, where unsanitized inputs exploit expansion (e.g., via * or ?) to manipulate chown targets, enabling unauthorized changes on arbitrary files. Historical vulnerabilities, such as CVE-2017-18018 in Coreutils through version 8.29, demonstrate race conditions during recursive symlink handling (-R -L options), permitting local users to replace files and escalate privileges by modifying . To mitigate these risks, execute chown with the least privileges possible, avoiding where feasible by leveraging capabilities like selectively adding CAP_CHOWN via --cap-add in containerized environments. The --from option in implementations targets changes only to files with specified current ownership, reducing unintended modifications. Integrating mandatory access controls, such as SELinux or , enforces policies that restrict chown operations beyond standard discretionary permissions, preventing escalation even if capabilities are present. Best practices include adhering to the principle of least privilege by auditing chown usage in scripts and applications, enabling system audit logs (e.g., via ) to ownership changes, and implementing post-operation scripts to confirm expected without exposing broader directories. In the 2025 landscape, container security emphasizes awareness of mounts in Dockerfiles; use the --chown flag during COPY or ADD instructions to set non-root at build time, combined with user namespaces (--userns-remap) to isolate capabilities and prevent filesystem exposure.

References

  1. [1]
    chown(1p) - Linux manual page - man7.org
    The chown utility shall set the user ID of the file named by each file operand to the user ID specified by the owner operand.
  2. [2]
    chown invocation (GNU Coreutils 9.9)
    ### Summary of `chown` Invocation (GNU Coreutils 9.9)
  3. [3]
    chown(1): change file owner/group - Linux man page
    This manual page documents the GNU version of chown. chown changes the user and/or group ownership of each given file.
  4. [4]
    chown - The Open Group Publications Catalog
    The chown utility shall set the user ID of the file named by each file operand to the user ID specified by the owner operand.
  5. [5]
    chown Command - IBM
    The chown command changes the owner of the file or directory specified by the File or Directory parameter to the user specified by the Owner parameter.
  6. [6]
    Unix File Permissions - NERSC Documentation
    Every file (and directory) has an owner, an associated Unix group, and a set of permission flags that specify separate read, write, and execute permissions.Brief Overview · Useful File Permission... · Chmod
  7. [7]
    Linux file permissions explained - Red Hat
    Jan 10, 2023 · The first digit is for owner permissions, the second digit is for group permissions, and the third is for other users. Each permission has a ...Missing: triplet | Show results with:triplet
  8. [8]
    Chown Command in Linux (File Ownership)
    Dec 12, 2023 · The chown command allows you to change the user and/or group ownership of a given file, directory, or symbolic link. In Linux, all files are ...
  9. [9]
  10. [10]
    chown - The Open Group Publications Catalog
    The chown utility shall set the user ID of the file named by each file operand to the user ID specified by the owner operand.
  11. [11]
    chown invocation (GNU Coreutils 9.8)
    13.1 chown : Change file owner and group. chown changes the user and/or group ownership of each given file to new-owner or to the user and group of an existing ...
  12. [12]
    chown - man pages section 1: User Commands
    Jul 27, 2022 · chown is CSI-enabled except for the owner and group names. In previous releases of Solaris, there was a /usr/ucb/chown command which had ...
  13. [13]
    [PDF] Cygwin User's Guide
    Cygwin is a Linux-like environment for Windows. It consists of a DLL (cygwin1.dll), which acts as an emulation layer providing substantial POSIX (Portable ...
  14. [14]
    Chmod/Chown WSL Improvements - Windows Command Line
    Jan 12, 2018 · You can now set the owner and group of files using chmod/chown and modify read/write/execute permissions in WSL. You can also create special ...
  15. [15]
    BusyBox
    ... chown: stop accepting deprecated USER.GROUP syntax, only : separator is allowed ... Android is based on Linux kernel, but sadly and unexplicably, Android ...About · Command Help · Of /downloads/binaries · Download Source
  16. [16]
    Unix Seventh Edition - Computer History Wiki
    Jul 1, 2025 · Date Released: January, 1979. This was the last research version of UNIX (although from V7 on, it was spelled 'Unix') to leave Bell Labs. ... 7 ...
  17. [17]
  18. [18]
    Early versions of the UNIX* system - Nokia
    Over time, a number of versions of UNIX were floating around, including Bell Labs official versions. ... Version 7, 1978, Universities and commercial. The ...
  19. [19]
    None
    - **Source Code**: Written in C, extracted from V7/usr/src/cmd/chown.c.
  20. [20]
    Setting Up Unix - Seventh Edition - Wolfram Schneider
    The distribution tape can be used only on a DEC PDP11/45 or PDP11/70 with RP03, RP04, RP05, RP06 disks and with a TU10, TU16, or TE16 tape drive.
  21. [21]
  22. [22]
    GNU Coreutils 9.4 Adds Experimental "--enable-systemd ... - Phoronix
    Aug 29, 2023 · GNU Coreutils 9.4 is out today as the latest version of this collection of utilities common to GNU/Linux systems and other platforms.
  23. [23]
    None
    Nothing is retrieved...<|separator|>
  24. [24]
    chown(1) - Linux manual page - man7.org
    This manual page documents the GNU version of chown. chown changes the user and/or group ownership of each given file.
  25. [25]
    getpwnam(3) - Linux manual page
    ### Summary of getpwnam(3) Man Page
  26. [26]
    chown(2) - Linux manual page - man7.org
    These system calls change the owner and group of a file. The chown(), fchown(), and lchown() system calls differ only in how the file is specified: • chown() ...
  27. [27]
    An introduction to Linux Access Control Lists (ACLs) - Red Hat
    Feb 6, 2020 · ACLs allow us to apply a more specific set of permissions to a file or directory without (necessarily) changing the base ownership and permissions.
  28. [28]
  29. [29]
    How to Use chown Command Recursively - phoenixNAP
    Jun 26, 2025 · See how to use chown recursive in Linux to change file and directory ownership, with examples, safety tips, and advanced options.
  30. [30]
    chown
    The chown() function shall change the user and group ownership of a file. The path argument points to a pathname naming a file.
  31. [31]
    POSIX® Systems - Test Suites - The Open Group
    The Open Group offers POSIX test suites for various IEEE standards, including VSX-PCTS and VSPSE suites, covering different profiles and versions.Missing: chown | Show results with:chown
  32. [32]
    Treating / specially (GNU Coreutils 9.8)
    The --preserve-root option also ensures that chgrp and chown do not modify / even when dereferencing a symlink pointing to / .
  33. [33]
    GNU Coreutils 9.5 Can Yield 10~20% Throughput Boost For cp, mv ...
    Mar 28, 2024 · The throughput with Coreutils 9.5 thanks to this change increases by 10~20% when reading cached files on modern systems.
  34. [34]
    coreutils-9.5 released [stable] - GNU mailing lists
    Mar 28, 2024 · This is to announce coreutils-9.5, a stable release. See the NEWS below for a summary of changes. There have been 187 commits by 18 people ...Re: Bug#249177: coreutils: chown is not POSIXLY_CORRECT even ...coreutils-9.1 released [stable] - GNU mailing listsMore results from lists.gnu.org
  35. [35]
    chmod(1p) - Linux manual page - man7.org
    The chmod utility shall change any or all of the file mode bits of the file named by each file operand in the way specified by the mode operand.
  36. [36]
    27.5 Directories and the Set-User-ID and Set-Group-ID Bits - GNU
    On most systems, if a directory's set-group-ID bit is set, newly created subfiles inherit the same group as the directory, and newly created subdirectories ...
  37. [37]
    Linux permissions: SUID, SGID, and sticky bit - Red Hat
    Oct 15, 2020 · I will give a quick explanation of the various ways to calculate permissions, and then we will focus on the special permissions within Linux.
  38. [38]
    auditctl(8) - Linux manual page
    ### How to Audit `chown` Calls Using `auditctl`
  39. [39]
    How to monitor permission, ownership or any other change to a ...
    Sep 7, 2025 · To check if auditd service is enabled, run the following command: RHEL 7 and later: systemctl status auditd. RHEL 6: chkconfig --list auditd.
  40. [40]
    Privilege Escalation via CAP_CHOWN/CAP_FOWNER Capabilities
    In Linux, the CAP_CHOWN capability allows a process to change the owner of a file, while CAP_FOWNER permits it to bypass permission checks on operations that ...
  41. [41]
    CVE-2017-18018 Detail - NVD
    Jan 3, 2018 · In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX "-R -L" ...Missing: 7476 | Show results with:7476
  42. [42]
    Potential Unauthorized Access via Wildcard Injection Detected
    This rule monitors for the execution of the "chown" and "chmod" commands with command line flags that could indicate a wildcard injection attack. Linux ...
  43. [43]
    Tutorial: Linux Privilege Escalation: Wildcards - RangeForce
    Dec 16, 2023 · By creating specific files and using wildcard injection, an attacker can manipulate the chown command to change ownership of critical files, ...
  44. [44]
    Docker Security - OWASP Cheat Sheet Series
    The aim of this cheat sheet is to provide a straightforward list of common security errors and best practices to assist in securing your Docker containers.