I know the behaviour of these syscalls. Problem is in other place:
creators of some programs think that their programs will be always run
with euid==0 (for example programs using svgalib). So they think that
after calling setuid() they drop all the privileges of previous uid.
Using my patch I can make some user capable to access ports, and his *uid
will be different than 0. So setuid() won't drop all his previous
privileges. And it may be dangerous.
Using other syscall doesn't solve the problem - you would have to modify
eg. all programs using svgalib! Changing the syscall is much easier, and I
think that now the things will be much logical...
Michal Kosek
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/