Think about Loose Coupling | |
PerlMonks |
comment on |
( [id://3333]=superdoc: print w/replies, xml ) | Need Help?? |
i am working on a script that will run setuid. i know the security lectures, but unfortunately, this one touches /etc/passwd so i am just trying to use taint checks as oft as possible and watch my back with any holes i can foresee.
in the process of the script however, i am writing the users being touched to a flat file. when running the script as setuid, i get an error complaining that opening a file via:
is not allowed or doesnt pass checks. sorry, but i cant at the moment recall the error and dont have the ability to duplicate it at the moment. does this sound familiar? is there a way to safely perform such a task in a setuid file? humbly -c In reply to filehandles and setuid by c
|
|