"James Youngman" <[EMAIL PROTECTED]> writes: > * The hacker now has access to a setuid binary which he knows has a > security problem. A websearch will probably reveal an exploit.
Hackers don't need to inspect hard links to do that. They can simply compute the checksums of the standard executables, or even just look at their time stamps. So this argument is a weak one. _______________________________________________ Bug-coreutils mailing list [email protected] http://lists.gnu.org/mailman/listinfo/bug-coreutils
