[EMAIL PROTECTED] (Paul Jarc) writes:

> I agree - the kernel does not set uid=euid.  (It preserves the old
> uid, and sets the new euid according to the file's owner.)  I was
> saying something different: if there is a program running in a setuid
> situation (i.e., its real uid is different from its effective uid)
> that changes its real uid to match its effective uid (I'm not claiming
> this happens often), and then runs another program, then that other
> program will have no way of knowing that it is in a setuid situation.

This isn't how we deal with setuid security in the Hurd, however.

A setuid exec is not just an exec where ruid != euid; it's
specifically one which *changes* the euid.  This case is dectected by
fs_exec, and the filesystem sets the "secure exec" flag.  

We don't want to change other execs, because there is no reason to
think there is any kind of security implication for them.



_______________________________________________
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd

Reply via email to