Why does the setuid bit work inconsistently?root owned program with setuid bit onWhy does setuid not work?Why isn't 'nethogs' installed with the setuid bit set?Why setuid does not work on executable?Using the setuid bit properlylinux setuid does not workWhat exactly differentiates the root user from every other user?Why doesn't setuid work with mount?SetUID bit not working in Ubuntu?setuid root does not work

Who knighted this Game of Thrones character?

Shorten or merge multiple lines of `&> /dev/null &`

If I arrive in the UK, and then head to mainland Europe, does my Schengen visa 90 day limit start when I arrived in the UK, or mainland Europe?

Which European Languages are not Indo-European?

3 prong range outlet

How to melt snow without fire or using body heat?

What is the recommended procedure to land a taildragger in a crosswind?

Count all vowels in string

Why did Jon Snow do this immoral act if he is so honorable?

Why is unzipped directory exactly 4.0k (much smaller than zipped file)?

Need to read my home electrical Meter

A burglar's sunglasses, a lady's odyssey

Are cells guaranteed to get at least one mitochondrion when they divide?

Why is this integration method not valid?

Python program for fibonacci sequence using a recursive function

Does an eye for an eye mean monetary compensation?

Why does FOO=bar; export the variable into my environment

Can we assume that a hash function with high collision resistance also means highly uniform distribution?

Final exams: What is the most common protocol for scheduling?

Where is Jon going?

Is keeping the forking link on a true fork necessary (Github/GPL)?

Freedom of Speech and Assembly in China

Is there any chance a man can get the death penalty for causing a miscarriage?

Why did other houses not demand this?



Why does the setuid bit work inconsistently?


root owned program with setuid bit onWhy does setuid not work?Why isn't 'nethogs' installed with the setuid bit set?Why setuid does not work on executable?Using the setuid bit properlylinux setuid does not workWhat exactly differentiates the root user from every other user?Why doesn't setuid work with mount?SetUID bit not working in Ubuntu?setuid root does not work






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty margin-bottom:0;








8















I wrote the code:



// a.c
#include <stdlib.h>
int main ()
system("/bin/sh");
return 0;



compiled with command:



gcc a.c -o a.out


added setuid bit on it:



sudo chown root.root a.out
sudo chmod 4755 a.out


On Ubuntu 14.04, when I run as general user, I got root privilege.



but on Ubuntu 16.04, I still got current user's shell.



Why is it different?










share|improve this question









New contributor



user10883182 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.

























    8















    I wrote the code:



    // a.c
    #include <stdlib.h>
    int main ()
    system("/bin/sh");
    return 0;



    compiled with command:



    gcc a.c -o a.out


    added setuid bit on it:



    sudo chown root.root a.out
    sudo chmod 4755 a.out


    On Ubuntu 14.04, when I run as general user, I got root privilege.



    but on Ubuntu 16.04, I still got current user's shell.



    Why is it different?










    share|improve this question









    New contributor



    user10883182 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.





















      8












      8








      8








      I wrote the code:



      // a.c
      #include <stdlib.h>
      int main ()
      system("/bin/sh");
      return 0;



      compiled with command:



      gcc a.c -o a.out


      added setuid bit on it:



      sudo chown root.root a.out
      sudo chmod 4755 a.out


      On Ubuntu 14.04, when I run as general user, I got root privilege.



      but on Ubuntu 16.04, I still got current user's shell.



      Why is it different?










      share|improve this question









      New contributor



      user10883182 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.











      I wrote the code:



      // a.c
      #include <stdlib.h>
      int main ()
      system("/bin/sh");
      return 0;



      compiled with command:



      gcc a.c -o a.out


      added setuid bit on it:



      sudo chown root.root a.out
      sudo chmod 4755 a.out


      On Ubuntu 14.04, when I run as general user, I got root privilege.



      but on Ubuntu 16.04, I still got current user's shell.



      Why is it different?







      linux ubuntu security privileges setuid






      share|improve this question









      New contributor



      user10883182 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.










      share|improve this question









      New contributor



      user10883182 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.








      share|improve this question




      share|improve this question








      edited May 17 at 5:04









      muru

      38.4k591168




      38.4k591168






      New contributor



      user10883182 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.








      asked May 16 at 17:37









      user10883182user10883182

      433




      433




      New contributor



      user10883182 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.




      New contributor




      user10883182 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






















          2 Answers
          2






          active

          oldest

          votes


















          8














          What changed is that /bin/sh either became bash or stayed dash which got an additional flag -p mimicking bash's behaviour.



          Bash requires the -p flag to not drop setuid privilege as explained in its man page:




          If the shell is started with the effective user (group) id not equal to the real user
          (group) id, and the -p option is not supplied, no startup files are read, shell functions
          are not inherited from the environment, the SHELLOPTS, BASHOPTS, CDPATH, and GLOBIGNORE
          variables, if they appear in the environment, are ignored, and the effective user id is
          set to the real user id
          . If the -p option is supplied at invocation, the startup behavior
          is the same, but the effective user id is not reset.




          Before, dash didn't care about this and allowed setuid execution (by doing nothing to prevent it). But Ubuntu 16.04's dash's manpage has an additional option described, similar to bash:




          -p priv

          Do not attempt to reset effective uid if it does not match uid. This is not set by default to help avoid incorrect usage by
          setuid root programs via system(3) or popen(3).




          This option didn't exist in upstream (which might not be have been reactive to a proposed patch*) nor Debian 9 but is present in Debian buster which got the patch since 2018.



          NOTE: as explained by Stéphane Chazelas, it's too late to invoke "/bin/sh -p" in system() because system() runs anything given through /bin/sh and so the setuid is already dropped. derobert's answer explains how to handle this, in the code before system().



          * more details on history here and there.






          share|improve this answer

























          • system("bash -p") runs sh -c "bash -p" so the privileges have already been dropped when bash is executed.

            – Stéphane Chazelas
            May 16 at 18:07











          • oh well ok. I'll remove the "solution" part better handled by derobert's answer anyway.

            – A.B
            May 16 at 18:08











          • See also bugs.debian.org/cgi-bin/bugreport.cgi?bug=734869

            – Stéphane Chazelas
            May 16 at 18:16











          • Looks like Ubuntu fixed dash in wily (15.10). bugs.launchpad.net/ubuntu/+source/dash/+bug/1215660

            – Mark Plotnick
            May 16 at 18:20






          • 1





            Note that Debian used to go the other way round. It used to patch bash so as not to drop privileges. Whether it's an improvement is arguable. Now, people who want to do a system() with elevated privileges (which, granted, they shouldn't in the first place) end-up doing a setresuid() before which is a lot worse as then the shell doesn't know it's suid so doesn't activate the mode where it doesn't trust its environment.

            – Stéphane Chazelas
            May 16 at 18:40


















          8














          Probably the shell is changing its effective user ID back to the real user ID as part of its startup for some reason or another. You could verify this by adding:



          /* needs _GNU_SOURCE; non-Linux users see setregid/setreuid instead */
          uid_t euid = geteuid(), egid = getegid();
          setresgid(egid, egid, egid);
          setresuid(euid, euid, euid);


          before your system(). (Actually, even on Linux, you probably only need to set the real ones; the saved ones should be fine to leave alone. This is just brute force to debug. Depending on why you're set-id, you may of course need to save the real IDs somewhere as well.)



          [Also, if this isn't just an exercise learning how setid works, then there are lot of security issues to worry about, especially when calling a shell. There are many environment variables, for example, that affect the shell's behavior. Prefer an already-existing approach like sudo if at all possible.]






          share|improve this answer

























          • I concentrated on the why it changed, while you provided the how to avoid the issue. +1

            – A.B
            May 16 at 18:07











          • Of course, if you really do need somewhere to save the real IDs, the saved ID is an awfully convenient place to do it. Especially if the effective IDs are not root:root.

            – Kevin
            May 17 at 3:25











          Your Answer








          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "106"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: false,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: null,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );






          user10883182 is a new contributor. Be nice, and check out our Code of Conduct.









          draft saved

          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f519338%2fwhy-does-the-setuid-bit-work-inconsistently%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          2 Answers
          2






          active

          oldest

          votes








          2 Answers
          2






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          8














          What changed is that /bin/sh either became bash or stayed dash which got an additional flag -p mimicking bash's behaviour.



          Bash requires the -p flag to not drop setuid privilege as explained in its man page:




          If the shell is started with the effective user (group) id not equal to the real user
          (group) id, and the -p option is not supplied, no startup files are read, shell functions
          are not inherited from the environment, the SHELLOPTS, BASHOPTS, CDPATH, and GLOBIGNORE
          variables, if they appear in the environment, are ignored, and the effective user id is
          set to the real user id
          . If the -p option is supplied at invocation, the startup behavior
          is the same, but the effective user id is not reset.




          Before, dash didn't care about this and allowed setuid execution (by doing nothing to prevent it). But Ubuntu 16.04's dash's manpage has an additional option described, similar to bash:




          -p priv

          Do not attempt to reset effective uid if it does not match uid. This is not set by default to help avoid incorrect usage by
          setuid root programs via system(3) or popen(3).




          This option didn't exist in upstream (which might not be have been reactive to a proposed patch*) nor Debian 9 but is present in Debian buster which got the patch since 2018.



          NOTE: as explained by Stéphane Chazelas, it's too late to invoke "/bin/sh -p" in system() because system() runs anything given through /bin/sh and so the setuid is already dropped. derobert's answer explains how to handle this, in the code before system().



          * more details on history here and there.






          share|improve this answer

























          • system("bash -p") runs sh -c "bash -p" so the privileges have already been dropped when bash is executed.

            – Stéphane Chazelas
            May 16 at 18:07











          • oh well ok. I'll remove the "solution" part better handled by derobert's answer anyway.

            – A.B
            May 16 at 18:08











          • See also bugs.debian.org/cgi-bin/bugreport.cgi?bug=734869

            – Stéphane Chazelas
            May 16 at 18:16











          • Looks like Ubuntu fixed dash in wily (15.10). bugs.launchpad.net/ubuntu/+source/dash/+bug/1215660

            – Mark Plotnick
            May 16 at 18:20






          • 1





            Note that Debian used to go the other way round. It used to patch bash so as not to drop privileges. Whether it's an improvement is arguable. Now, people who want to do a system() with elevated privileges (which, granted, they shouldn't in the first place) end-up doing a setresuid() before which is a lot worse as then the shell doesn't know it's suid so doesn't activate the mode where it doesn't trust its environment.

            – Stéphane Chazelas
            May 16 at 18:40















          8














          What changed is that /bin/sh either became bash or stayed dash which got an additional flag -p mimicking bash's behaviour.



          Bash requires the -p flag to not drop setuid privilege as explained in its man page:




          If the shell is started with the effective user (group) id not equal to the real user
          (group) id, and the -p option is not supplied, no startup files are read, shell functions
          are not inherited from the environment, the SHELLOPTS, BASHOPTS, CDPATH, and GLOBIGNORE
          variables, if they appear in the environment, are ignored, and the effective user id is
          set to the real user id
          . If the -p option is supplied at invocation, the startup behavior
          is the same, but the effective user id is not reset.




          Before, dash didn't care about this and allowed setuid execution (by doing nothing to prevent it). But Ubuntu 16.04's dash's manpage has an additional option described, similar to bash:




          -p priv

          Do not attempt to reset effective uid if it does not match uid. This is not set by default to help avoid incorrect usage by
          setuid root programs via system(3) or popen(3).




          This option didn't exist in upstream (which might not be have been reactive to a proposed patch*) nor Debian 9 but is present in Debian buster which got the patch since 2018.



          NOTE: as explained by Stéphane Chazelas, it's too late to invoke "/bin/sh -p" in system() because system() runs anything given through /bin/sh and so the setuid is already dropped. derobert's answer explains how to handle this, in the code before system().



          * more details on history here and there.






          share|improve this answer

























          • system("bash -p") runs sh -c "bash -p" so the privileges have already been dropped when bash is executed.

            – Stéphane Chazelas
            May 16 at 18:07











          • oh well ok. I'll remove the "solution" part better handled by derobert's answer anyway.

            – A.B
            May 16 at 18:08











          • See also bugs.debian.org/cgi-bin/bugreport.cgi?bug=734869

            – Stéphane Chazelas
            May 16 at 18:16











          • Looks like Ubuntu fixed dash in wily (15.10). bugs.launchpad.net/ubuntu/+source/dash/+bug/1215660

            – Mark Plotnick
            May 16 at 18:20






          • 1





            Note that Debian used to go the other way round. It used to patch bash so as not to drop privileges. Whether it's an improvement is arguable. Now, people who want to do a system() with elevated privileges (which, granted, they shouldn't in the first place) end-up doing a setresuid() before which is a lot worse as then the shell doesn't know it's suid so doesn't activate the mode where it doesn't trust its environment.

            – Stéphane Chazelas
            May 16 at 18:40













          8












          8








          8







          What changed is that /bin/sh either became bash or stayed dash which got an additional flag -p mimicking bash's behaviour.



          Bash requires the -p flag to not drop setuid privilege as explained in its man page:




          If the shell is started with the effective user (group) id not equal to the real user
          (group) id, and the -p option is not supplied, no startup files are read, shell functions
          are not inherited from the environment, the SHELLOPTS, BASHOPTS, CDPATH, and GLOBIGNORE
          variables, if they appear in the environment, are ignored, and the effective user id is
          set to the real user id
          . If the -p option is supplied at invocation, the startup behavior
          is the same, but the effective user id is not reset.




          Before, dash didn't care about this and allowed setuid execution (by doing nothing to prevent it). But Ubuntu 16.04's dash's manpage has an additional option described, similar to bash:




          -p priv

          Do not attempt to reset effective uid if it does not match uid. This is not set by default to help avoid incorrect usage by
          setuid root programs via system(3) or popen(3).




          This option didn't exist in upstream (which might not be have been reactive to a proposed patch*) nor Debian 9 but is present in Debian buster which got the patch since 2018.



          NOTE: as explained by Stéphane Chazelas, it's too late to invoke "/bin/sh -p" in system() because system() runs anything given through /bin/sh and so the setuid is already dropped. derobert's answer explains how to handle this, in the code before system().



          * more details on history here and there.






          share|improve this answer















          What changed is that /bin/sh either became bash or stayed dash which got an additional flag -p mimicking bash's behaviour.



          Bash requires the -p flag to not drop setuid privilege as explained in its man page:




          If the shell is started with the effective user (group) id not equal to the real user
          (group) id, and the -p option is not supplied, no startup files are read, shell functions
          are not inherited from the environment, the SHELLOPTS, BASHOPTS, CDPATH, and GLOBIGNORE
          variables, if they appear in the environment, are ignored, and the effective user id is
          set to the real user id
          . If the -p option is supplied at invocation, the startup behavior
          is the same, but the effective user id is not reset.




          Before, dash didn't care about this and allowed setuid execution (by doing nothing to prevent it). But Ubuntu 16.04's dash's manpage has an additional option described, similar to bash:




          -p priv

          Do not attempt to reset effective uid if it does not match uid. This is not set by default to help avoid incorrect usage by
          setuid root programs via system(3) or popen(3).




          This option didn't exist in upstream (which might not be have been reactive to a proposed patch*) nor Debian 9 but is present in Debian buster which got the patch since 2018.



          NOTE: as explained by Stéphane Chazelas, it's too late to invoke "/bin/sh -p" in system() because system() runs anything given through /bin/sh and so the setuid is already dropped. derobert's answer explains how to handle this, in the code before system().



          * more details on history here and there.







          share|improve this answer














          share|improve this answer



          share|improve this answer








          edited May 16 at 18:40

























          answered May 16 at 18:05









          A.BA.B

          6,81611233




          6,81611233












          • system("bash -p") runs sh -c "bash -p" so the privileges have already been dropped when bash is executed.

            – Stéphane Chazelas
            May 16 at 18:07











          • oh well ok. I'll remove the "solution" part better handled by derobert's answer anyway.

            – A.B
            May 16 at 18:08











          • See also bugs.debian.org/cgi-bin/bugreport.cgi?bug=734869

            – Stéphane Chazelas
            May 16 at 18:16











          • Looks like Ubuntu fixed dash in wily (15.10). bugs.launchpad.net/ubuntu/+source/dash/+bug/1215660

            – Mark Plotnick
            May 16 at 18:20






          • 1





            Note that Debian used to go the other way round. It used to patch bash so as not to drop privileges. Whether it's an improvement is arguable. Now, people who want to do a system() with elevated privileges (which, granted, they shouldn't in the first place) end-up doing a setresuid() before which is a lot worse as then the shell doesn't know it's suid so doesn't activate the mode where it doesn't trust its environment.

            – Stéphane Chazelas
            May 16 at 18:40

















          • system("bash -p") runs sh -c "bash -p" so the privileges have already been dropped when bash is executed.

            – Stéphane Chazelas
            May 16 at 18:07











          • oh well ok. I'll remove the "solution" part better handled by derobert's answer anyway.

            – A.B
            May 16 at 18:08











          • See also bugs.debian.org/cgi-bin/bugreport.cgi?bug=734869

            – Stéphane Chazelas
            May 16 at 18:16











          • Looks like Ubuntu fixed dash in wily (15.10). bugs.launchpad.net/ubuntu/+source/dash/+bug/1215660

            – Mark Plotnick
            May 16 at 18:20






          • 1





            Note that Debian used to go the other way round. It used to patch bash so as not to drop privileges. Whether it's an improvement is arguable. Now, people who want to do a system() with elevated privileges (which, granted, they shouldn't in the first place) end-up doing a setresuid() before which is a lot worse as then the shell doesn't know it's suid so doesn't activate the mode where it doesn't trust its environment.

            – Stéphane Chazelas
            May 16 at 18:40
















          system("bash -p") runs sh -c "bash -p" so the privileges have already been dropped when bash is executed.

          – Stéphane Chazelas
          May 16 at 18:07





          system("bash -p") runs sh -c "bash -p" so the privileges have already been dropped when bash is executed.

          – Stéphane Chazelas
          May 16 at 18:07













          oh well ok. I'll remove the "solution" part better handled by derobert's answer anyway.

          – A.B
          May 16 at 18:08





          oh well ok. I'll remove the "solution" part better handled by derobert's answer anyway.

          – A.B
          May 16 at 18:08













          See also bugs.debian.org/cgi-bin/bugreport.cgi?bug=734869

          – Stéphane Chazelas
          May 16 at 18:16





          See also bugs.debian.org/cgi-bin/bugreport.cgi?bug=734869

          – Stéphane Chazelas
          May 16 at 18:16













          Looks like Ubuntu fixed dash in wily (15.10). bugs.launchpad.net/ubuntu/+source/dash/+bug/1215660

          – Mark Plotnick
          May 16 at 18:20





          Looks like Ubuntu fixed dash in wily (15.10). bugs.launchpad.net/ubuntu/+source/dash/+bug/1215660

          – Mark Plotnick
          May 16 at 18:20




          1




          1





          Note that Debian used to go the other way round. It used to patch bash so as not to drop privileges. Whether it's an improvement is arguable. Now, people who want to do a system() with elevated privileges (which, granted, they shouldn't in the first place) end-up doing a setresuid() before which is a lot worse as then the shell doesn't know it's suid so doesn't activate the mode where it doesn't trust its environment.

          – Stéphane Chazelas
          May 16 at 18:40





          Note that Debian used to go the other way round. It used to patch bash so as not to drop privileges. Whether it's an improvement is arguable. Now, people who want to do a system() with elevated privileges (which, granted, they shouldn't in the first place) end-up doing a setresuid() before which is a lot worse as then the shell doesn't know it's suid so doesn't activate the mode where it doesn't trust its environment.

          – Stéphane Chazelas
          May 16 at 18:40













          8














          Probably the shell is changing its effective user ID back to the real user ID as part of its startup for some reason or another. You could verify this by adding:



          /* needs _GNU_SOURCE; non-Linux users see setregid/setreuid instead */
          uid_t euid = geteuid(), egid = getegid();
          setresgid(egid, egid, egid);
          setresuid(euid, euid, euid);


          before your system(). (Actually, even on Linux, you probably only need to set the real ones; the saved ones should be fine to leave alone. This is just brute force to debug. Depending on why you're set-id, you may of course need to save the real IDs somewhere as well.)



          [Also, if this isn't just an exercise learning how setid works, then there are lot of security issues to worry about, especially when calling a shell. There are many environment variables, for example, that affect the shell's behavior. Prefer an already-existing approach like sudo if at all possible.]






          share|improve this answer

























          • I concentrated on the why it changed, while you provided the how to avoid the issue. +1

            – A.B
            May 16 at 18:07











          • Of course, if you really do need somewhere to save the real IDs, the saved ID is an awfully convenient place to do it. Especially if the effective IDs are not root:root.

            – Kevin
            May 17 at 3:25















          8














          Probably the shell is changing its effective user ID back to the real user ID as part of its startup for some reason or another. You could verify this by adding:



          /* needs _GNU_SOURCE; non-Linux users see setregid/setreuid instead */
          uid_t euid = geteuid(), egid = getegid();
          setresgid(egid, egid, egid);
          setresuid(euid, euid, euid);


          before your system(). (Actually, even on Linux, you probably only need to set the real ones; the saved ones should be fine to leave alone. This is just brute force to debug. Depending on why you're set-id, you may of course need to save the real IDs somewhere as well.)



          [Also, if this isn't just an exercise learning how setid works, then there are lot of security issues to worry about, especially when calling a shell. There are many environment variables, for example, that affect the shell's behavior. Prefer an already-existing approach like sudo if at all possible.]






          share|improve this answer

























          • I concentrated on the why it changed, while you provided the how to avoid the issue. +1

            – A.B
            May 16 at 18:07











          • Of course, if you really do need somewhere to save the real IDs, the saved ID is an awfully convenient place to do it. Especially if the effective IDs are not root:root.

            – Kevin
            May 17 at 3:25













          8












          8








          8







          Probably the shell is changing its effective user ID back to the real user ID as part of its startup for some reason or another. You could verify this by adding:



          /* needs _GNU_SOURCE; non-Linux users see setregid/setreuid instead */
          uid_t euid = geteuid(), egid = getegid();
          setresgid(egid, egid, egid);
          setresuid(euid, euid, euid);


          before your system(). (Actually, even on Linux, you probably only need to set the real ones; the saved ones should be fine to leave alone. This is just brute force to debug. Depending on why you're set-id, you may of course need to save the real IDs somewhere as well.)



          [Also, if this isn't just an exercise learning how setid works, then there are lot of security issues to worry about, especially when calling a shell. There are many environment variables, for example, that affect the shell's behavior. Prefer an already-existing approach like sudo if at all possible.]






          share|improve this answer















          Probably the shell is changing its effective user ID back to the real user ID as part of its startup for some reason or another. You could verify this by adding:



          /* needs _GNU_SOURCE; non-Linux users see setregid/setreuid instead */
          uid_t euid = geteuid(), egid = getegid();
          setresgid(egid, egid, egid);
          setresuid(euid, euid, euid);


          before your system(). (Actually, even on Linux, you probably only need to set the real ones; the saved ones should be fine to leave alone. This is just brute force to debug. Depending on why you're set-id, you may of course need to save the real IDs somewhere as well.)



          [Also, if this isn't just an exercise learning how setid works, then there are lot of security issues to worry about, especially when calling a shell. There are many environment variables, for example, that affect the shell's behavior. Prefer an already-existing approach like sudo if at all possible.]







          share|improve this answer














          share|improve this answer



          share|improve this answer








          edited May 16 at 19:16

























          answered May 16 at 18:05









          derobertderobert

          76.5k8165223




          76.5k8165223












          • I concentrated on the why it changed, while you provided the how to avoid the issue. +1

            – A.B
            May 16 at 18:07











          • Of course, if you really do need somewhere to save the real IDs, the saved ID is an awfully convenient place to do it. Especially if the effective IDs are not root:root.

            – Kevin
            May 17 at 3:25

















          • I concentrated on the why it changed, while you provided the how to avoid the issue. +1

            – A.B
            May 16 at 18:07











          • Of course, if you really do need somewhere to save the real IDs, the saved ID is an awfully convenient place to do it. Especially if the effective IDs are not root:root.

            – Kevin
            May 17 at 3:25
















          I concentrated on the why it changed, while you provided the how to avoid the issue. +1

          – A.B
          May 16 at 18:07





          I concentrated on the why it changed, while you provided the how to avoid the issue. +1

          – A.B
          May 16 at 18:07













          Of course, if you really do need somewhere to save the real IDs, the saved ID is an awfully convenient place to do it. Especially if the effective IDs are not root:root.

          – Kevin
          May 17 at 3:25





          Of course, if you really do need somewhere to save the real IDs, the saved ID is an awfully convenient place to do it. Especially if the effective IDs are not root:root.

          – Kevin
          May 17 at 3:25










          user10883182 is a new contributor. Be nice, and check out our Code of Conduct.









          draft saved

          draft discarded


















          user10883182 is a new contributor. Be nice, and check out our Code of Conduct.












          user10883182 is a new contributor. Be nice, and check out our Code of Conduct.











          user10883182 is a new contributor. Be nice, and check out our Code of Conduct.














          Thanks for contributing an answer to Unix & Linux Stack Exchange!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid


          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.

          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f519338%2fwhy-does-the-setuid-bit-work-inconsistently%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Get product attribute by attribute group code in magento 2get product attribute by product attribute group in magento 2Magento 2 Log Bundle Product Data in List Page?How to get all product attribute of a attribute group of Default attribute set?Magento 2.1 Create a filter in the product grid by new attributeMagento 2 : Get Product Attribute values By GroupMagento 2 How to get all existing values for one attributeMagento 2 get custom attribute of a single product inside a pluginMagento 2.3 How to get all the Multi Source Inventory (MSI) locations collection in custom module?Magento2: how to develop rest API to get new productsGet product attribute by attribute group code ( [attribute_group_code] ) in magento 2

          Category:9 (number) SubcategoriesMedia in category "9 (number)"Navigation menuUpload mediaGND ID: 4485639-8Library of Congress authority ID: sh85091979ReasonatorScholiaStatistics

          Get RecordId in LWC From Community PageLWC Community recordId undefinedhow to get Personal Access Token from my integrated application LWC. I am using js onlylwc quick action from Opportunity page(aura:component) and not getting @api recordIdLWC Community recordId undefinedLWC - How to get label name of buttonsLWC: Add a region in custom community themeVisual force page redirection from lightning communityLWC NavigationMixin does not work in CommunityInvoking LWC component from a plain URL - Read URL Parameter inside LWCLWC download PDF fileLWC Get Pick-list Field Values