Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 26 Feb 1996 23:20:02 -0800 (PST)
From:      invalid opcode <coredump@nervosa.com>
To:        Brian Tao <taob@io.org>
Cc:        Mark Smith <msmith@comtch.iea.com>, freebsd-security@freebsd.org
Subject:   Re: Suspicious symlinks in /tmp
Message-ID:  <Pine.BSF.3.91.960226231829.14369J-100000@nervosa.com>
In-Reply-To: <Pine.BSF.3.91.960226152446.860D-100000@zip.io.org>

index | next in thread | previous in thread | raw e-mail

On Mon, 26 Feb 1996, Brian Tao wrote:

>     We seem to be going around in circles here.  ;-)
> Brian Tao (BT300, taob@io.org)

It has been brought to my attention that none of the standard password 
utilities make use of /tmp, only /etc. So you should be safe there. But 
of course, if there are any suid programs that use relative paths instead 
of absolute ones, this will be a problem.

== Chris Layne ==============================================================
== coredump@nervosa.com ================= http://www.nervosa.com/~coredump ==



help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.960226231829.14369J-100000>