Date: Mon, 11 Aug 1997 22:38:09 +0200 (CEST) From: Andre Albsmeier <Andre.Albsmeier@mchp.siemens.de> To: freebsd-questions@freebsd.org Subject: Please explain why this is a security hole in /etc/daily Message-ID: <199708112038.WAA19822@curry.mchp.siemens.de>
index | next in thread | raw e-mail
Hi,
using 2.2-STABLE we find the following in /etc/daily:
# This is a security hole, never use 'find' on a public directory
# with -exec rm -f as root. This can be exploited to delete any file
# on the system.
#
#find / \( ! -fstype local -o -fstype rdonly \) -a -prune -o \
# \( -name '[#,]*' -o -name '.#*' -o -name a.out -o -name '*.core' \
# -o -name '*.CKP' -o -name '.emacs_[0-9]*' \) \
# -a -atime +3 -exec rm -f -- {} \;
#
#
# The same security hole. Purge the temp directories from unused stuff.
# Note that we must not accidentally clean the X11 lock files.
#
# Use at your own risk, but for a long-living system, this might come
# more useful than the boot-time cleaning of /tmp. If /var/tmp and
# /tmp are symlinked together, only one of the below will actually
# run.
Please tell me, why this is so, and how I could clean /tmp securely
since this is no longer done at startup. I have experimented a bit
with find and symlinks but didn't find anything unsecure :-)
Thanks very much,
-Andre
help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199708112038.WAA19822>
