"James Youngman" <[EMAIL PROTECTED]> writes:

>  * The hacker now has access to a setuid binary which he knows has a
> security problem.  A websearch will probably reveal an exploit.

Hackers don't need to inspect hard links to do that.  They can simply
compute the checksums of the standard executables, or even just look
at their time stamps.  So this argument is a weak one.


_______________________________________________
Bug-coreutils mailing list
[email protected]
http://lists.gnu.org/mailman/listinfo/bug-coreutils

Reply via email to