Antti J HÃtinen <[EMAIL PROTECTED]> writes:

> Is there a patch against this exploit?

I don't see any exploit that is related to fileutils.  "rm" doesn't
have setuid privileges, so whatever "rm" can do under the supposed
"exploit", your C program can do anyway.

It's true that you can fool "rm" into thinking that it is running as
root, but you can just as easily take the source code to "rm", modify
it so that the modified "rm" thinks that it is running as root,
compile the modified version, and run it.  Same effect.


_______________________________________________
Bug-coreutils mailing list
[EMAIL PROTECTED]
http://lists.gnu.org/mailman/listinfo/bug-coreutils

Reply via email to