IT Questions and Answers :)

animated-update-image-0026

COVID-19 India HEAT MAP

A message to our readers about COVID-19

With the uncertainty surrounding the outbreak of the corona virus. We want to reassure our reader stay safe and Healthy.Be aware and alert. Work as one nation. Sanitize and disinfect all equipment before entering your home, work and anywhere.

Wednesday, November 22, 2017

In Linux, if the "setuid" bit is set, what happens to the permissions of a file when it is executed by a user?

In Linux, if the "setuid" bit is set, what happens to the permissions of a file when it is executed by a user?

  • Gives every user write permissions
  • Runs it with the same rights as the file's owner
  • Inherits group privileges of the file
  • Remains in the memory more time after execution 
In Linux, if the "setuid" bit is set, what happens to the permissions of a file when it is executed by a user?

EXPLANATION

In addition to the basic file permissions in Linux, there are few special permissions that are available for executable files and directories The "setuid" (set user ID upon execution) Unix access rights flag allow users to run an executable with the permissions of the executable's owner. If the SETGID is set, it inherits the group privileges of the file on execution, not the user privileges.
The setuid flag can pose a security risk if it is assigned to executable programs that are not carefully designed. 

Share:

0 comments:

Post a Comment

Popular Posts