diff options
author | Bruno Haible <bruno@clisp.org> | 2017-09-14 00:35:56 +0200 |
---|---|---|
committer | Bruno Haible <bruno@clisp.org> | 2017-09-14 00:35:56 +0200 |
commit | 03eac9d394567d707a74826dfc9c305555946597 (patch) | |
tree | df5743f58e2f39dd8ad3b30da118b3afad285c9e /lib/idpriv-drop.c | |
parent | b7773f3f796588544f36b45be274f42b36b42149 (diff) | |
download | gnulib-03eac9d394567d707a74826dfc9c305555946597.tar.gz |
all: Replace many more http URLs by https URLs. Update stale URLs.
* users.txt: Remove mention of 'newts'.
* lib/localename.c: Update comment about LANG_SOTHO.
Diffstat (limited to 'lib/idpriv-drop.c')
-rw-r--r-- | lib/idpriv-drop.c | 6 |
1 files changed, 4 insertions, 2 deletions
diff --git a/lib/idpriv-drop.c b/lib/idpriv-drop.c index 5aaa11d801..7d6d769976 100644 --- a/lib/idpriv-drop.c +++ b/lib/idpriv-drop.c @@ -54,7 +54,8 @@ idpriv_drop (void) #if HAVE_SETRESUID /* glibc, FreeBSD, OpenBSD, HP-UX */ /* On systems which have setresuid(), we use it instead of setreuid(), because - <http://www.usenix.org/events/sec02/full_papers/chen/chen.pdf> + Hao Chen, David Wagner, Drew Dean: Setuid Demystified + <https://www.usenix.org/legacy/publications/library/proceedings/sec02/full_papers/chen/chen.pdf> says about setreuid(): "The rule by which the saved uid id is modified is complicated." Similarly, <http://unixpapa.com/incnote/setuid.html> says about setreuid(): "What exactly happens to the saved UID when this @@ -76,7 +77,8 @@ idpriv_drop (void) functions), we could read /proc/<pid>/cred and verify the saved uid and gid found there. But it's not clear to me when to interpret the file as a 'prcred_t' and when as a 'prcred32_t'. - <http://www.usenix.org/events/sec02/full_papers/chen/chen.pdf> + Hao Chen, David Wagner, Drew Dean: Setuid Demystified + <https://www.usenix.org/legacy/publications/library/proceedings/sec02/full_papers/chen/chen.pdf> section 8.1.3 also recommends to use a setreuid call as a probe, but this call would unexpectedly succeed (and the verification thus fail) on Linux if the process has the CAP_SETUID capability. |