Date: Mon, 26 Feb 1996 23:20:02 -0800 (PST) From: invalid opcode <coredump@nervosa.com> To: Brian Tao <taob@io.org> Cc: Mark Smith <msmith@comtch.iea.com>, freebsd-security@freebsd.org Subject: Re: Suspicious symlinks in /tmp Message-ID: <Pine.BSF.3.91.960226231829.14369J-100000@nervosa.com> In-Reply-To: <Pine.BSF.3.91.960226152446.860D-100000@zip.io.org>
index | next in thread | previous in thread | raw e-mail
On Mon, 26 Feb 1996, Brian Tao wrote: > We seem to be going around in circles here. ;-) > Brian Tao (BT300, taob@io.org) It has been brought to my attention that none of the standard password utilities make use of /tmp, only /etc. So you should be safe there. But of course, if there are any suid programs that use relative paths instead of absolute ones, this will be a problem. == Chris Layne ============================================================== == coredump@nervosa.com ================= http://www.nervosa.com/~coredump ==help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.960226231829.14369J-100000>
