Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 30 Oct 2000 18:59:12 -0600 (CST)
From:      James Wyatt <jwyatt@rwsystems.net>
To:        Kris Kennaway <kris@FreeBSD.ORG>
Cc:        Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>, freebsd-security@FreeBSD.ORG
Subject:   Re: tcsh: unsafe tempfile in << redirects (fwd)
Message-ID:  <Pine.BSF.4.10.10010301845450.60655-100000@bsdie.rwsystems.net>
In-Reply-To: <20001030153129.A15198@citusc17.usc.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 30 Oct 2000, Kris Kennaway wrote:
> On Mon, Oct 30, 2000 at 01:26:41PM -0800, Cy Schubert - ITSD Open Systems Group wrote:
> > Our tcsh appears vulnerable.  So is the 44bsd-csh port.
> 
> Yep, stupid braindead $*&^*# shells...

Was that comment *really* necessary? I use bash myself, but have enough
users using tcsh (and ksh, etc) that I care about them too. Of course,
some folks consider Emacs their shell... Most are just glad to have
something besides command.com to work with. (^_^)

Take care - Jy@



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.10010301845450.60655-100000>