According to Jules Bean: > On Sun, 31 Jan 1999, Chip Salzenberg wrote: > > The code exists to check the mount options relevant to an open file. > > It's just a Small Matter of Programming to integrate that into the > > Perl source code, and disable emultation of setuid scripts when the > > 'nosuid' mount option is set. > > But, then every interpreter should do this [...] every suid-emulating > interpreter.
(For those who don't know, suidperl is a setuid root binary that securely *emulates* setuid scripts on operating systems that don't support them directly.) And yes, in theory, other suid-emulating interpreters ought to do the same checks -- but AFAIK, there _are_ no others. > Why hasn't linus patched the kernel so that suid scripts are secure? > It's an easy task, surely? "Beats the heck out of me, Batman." > As it is, noexec is almost useless. I can't help thinking that > *all* interpreters *should* check noexec status. What's the point? Such files can be copied to /tmp and run there.... -- Chip Salzenberg - a.k.a. - <[EMAIL PROTECTED]> "When do you work?" "Whenever I'm not busy."