From owner-freebsd-security Wed Feb 5 14:23:26 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id OAA17123 for security-outgoing; Wed, 5 Feb 1997 14:23:26 -0800 (PST) Received: from root.com (implode.root.com [198.145.90.17]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id OAA17113 for ; Wed, 5 Feb 1997 14:23:16 -0800 (PST) Received: from localhost (localhost [127.0.0.1]) by root.com (8.7.6/8.6.5) with SMTP id OAA11687; Wed, 5 Feb 1997 14:23:09 -0800 (PST) Message-Id: <199702052223.OAA11687@root.com> X-Authentication-Warning: implode.root.com: Host localhost [127.0.0.1] didn't use HELO protocol To: Karl Denninger cc: tqbf@enteract.com, freebsd-security@freebsd.org Subject: Re: While we're on the subject... In-reply-to: Your message of "Wed, 05 Feb 1997 15:42:56 CST." <199702052142.PAA15082@Jupiter.Mcs.Net> From: David Greenman Reply-To: dg@root.com Date: Wed, 05 Feb 1997 14:23:09 -0800 Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk >> What's holding FreeBSD up on supporting issetugid()? >> >> ---------------- >> Thomas Ptacek at EnterAct, L.L.C., Chicago, IL [tqbf@enteract.com] >> ---------------- >> "I'm standing alone, I'm watching you all, I'm seeing you sinking." > >If euid != uid, then you're running SUID *NOW*. >If euid = 0, then you're running as root *NOW*. > >Why does it matter what you might have been sometime before? The issue is >what you are running as at the time the call is made, no? Programs that were once privileged might have read sensitive information into memory which could possibly be read out if some hole were exploited. -DG David Greenman Core-team/Principal Architect, The FreeBSD Project