home *** CD-ROM | disk | FTP | other *** search
- Organization: Sophomore, Physics, Carnegie Mellon, Pittsburgh, PA
- Path: sparky!uunet!wupost!zaphod.mps.ohio-state.edu!rpi!batcomputer!cornell!rochester!cantaloupe.srv.cs.cmu.edu!crabapple.srv.cs.cmu.edu!andrew.cmu.edu!fl0p+
- Newsgroups: comp.os.linux
- Message-ID: <kecw=5m00VogI1C1Jm@andrew.cmu.edu>
- Date: Tue, 1 Sep 1992 15:21:41 -0400
- From: Frank T Lofaro <fl0p+@andrew.cmu.edu>
- Subject: Re: clearing SUID bit on writes
- In-Reply-To: <1992Sep1.170221.17317@athena.mit.edu>
- References: <1992Sep1.170221.17317@athena.mit.edu>
- Lines: 8
-
- Linux should definitely un-setuid and un-setgid files on any
- modification (such as an append). Otherwise it could prove to be a very
- nasty security hole. (by the way, I just verified the Ultrix does clear
- these bits on a decstation here). We should not worry about this
- breaking anything, since anything that depends on setuid and setgid
- staying set after a file modifcation doesn't belong in a secure (well,
- as secure as UN*X can reasonably be) environment.
-
-