Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 24 Dec 1996 15:56:21 -0600 (CST)
From:      igor@alecto.physics.uiuc.edu (Igor Roshchin)
To:        marcs@znep.com (Marc Slemko)
Cc:        steve@edmweb.com, freebsd-security@freebsd.org
Subject:   Re: Holes in default cron jobs (fwd)
Message-ID:  <199612242156.PAA23404@alecto.physics.uiuc.edu>
In-Reply-To: <Pine.BSF.3.95.961223224443.19477F-100000@alive.ampr.ab.ca> from "Marc Slemko" at Dec 23, 96 11:01:35 pm

next in thread | previous in thread | raw e-mail | index | archive | help

> 	  Modified:    etc       security
> 	  Log:
> 	  Move intermediary file generation to /var partition
> 	  
> 	  Revision  Changes    Path
> 	  1.14      +2 -2      src/etc/security
> 
> This change simply does:
> 
> ----snip----
> --- security    1996/06/30 19:35:20     1.13
> +++ security    1996/07/31 06:47:05     1.14
> @@ -15,7 +15,7 @@
>  echo "Subject: $host security check output"
>  
>  LOG=/var/log
> -TMP=/tmp/_secure.$$
> +TMP=/var/run/_secure.$$
>  
>  umask 027
> 
> ----snip----
> 
> which secures it by using /var/run, which shouldn't be world writable. 

Excuse me, I was wondering (it might be stupid, 'cause I am probably
about something), why don't do a simple check for existence of the file,
something like

if ( -f $TMP  ) then
  rm -rf $TMP
endif

Thanks for the answers, and Merry X-mas and Happy New Year!

IgoR
aka StR
 




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199612242156.PAA23404>