Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 6 Sep 2001 01:30:30 +0200
From:      "Nicolas Rachinsky" <list@rachinsky.de>
To:        "Piet Delport" <siberiyan@mweb.co.za>, "Giorgos Keramidas" <charon@labs.gr>
Cc:        <freebsd-chat@FreeBSD.ORG>
Subject:   Re: Scripts and setuid
Message-ID:  <00c101c13662$c3716cd0$0364000a@abc>
References:  <999708032.3b96558062cd2@webmail.neomedia.it> <20010905204055.A268@athalon> <20010905215258.A4304@hades.hell.gr> <20010906005600.A4157@athalon>

next in thread | previous in thread | raw e-mail | index | archive | help
I don't know if this applies to FreeBSD, but I found the=20
following in the Perl documentation.

from perldoc perlsec:
       Beyond the obvious problems that stem from giving special
       privileges to systems as flexible as scripts, on many
       versions of Unix, set-id scripts are inherently insecure
       right from the start.  The problem is a race condition in
       the kernel.  Between the time the kernel opens the file to
       see which interpreter to run and when the (now-set-id)
       interpreter turns around and reopens the file to interpret
       it, the file in question may have changed, especially if
       you have symbolic links on your system.





To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-chat" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?00c101c13662$c3716cd0$0364000a>