Jeroen van Wolffelaar <email@example.com> writes:
> On Wed, May 19, 2004 at 07:53:46AM -0400, James Damour wrote:
>> On Tue, 2004-05-18 at 09:03, Steven Augart wrote:
>> > As you probably know, when a shell sees that it is running a setuid or
>> > setgid shell script, it detects this because the euid and ruid or egid
>> > and rgid are different. It "fixes" this by setting the euid to be the
>> > same as the ruid, and/or egid the same as the rgid, effectively
>> > turning off the setuid/setgid bit.
> Huh? This is wrong. It is the kernel who refuses to set the UID or GID
> on execution of setuid/gid shell scripts.
> Where did you read that?
Could it be you mean bash droping the setuid/setgid bits when it is
set setuid/setgid? Thats a bash speciality preventing hackers to
setuid/gid bash as so many rootkits have done in the past.