Thijs Kinkhorst wrote:
> Hi,
> 
>> Done as the mass-opening of symlink attack in /tmp was wrong in this case.
> 
> I don't think closing this is the appropriate action. Sure, debug code is not 
> top priority. But still, the fix is straghtforward and puts extra protection 
> on those running in debug mode. Besides, people tend to copy-paste stuff all 
> the time so eliminating it may prevent introducing a more pertinent bug.
> 
> I therefore encourage you strongly to just address the issue for lenny, even 
> if it's only debug code.
> 
> 
> Thijs

Hi,

First of all, I didn't realise that this script was in DEBUG mode by
default. So apologies for it, next time, I'll read more carefully the
reports, and take a bigger care when importing code from others (in
fact, my colleague Damien did import the file, so I'll let him know he
should take more care).

Second, do you guys think that setting the variable to DEBUG=0 by
default, then writing a BIG BIG BIG warning next to it in the code is
enough? Like: "WARNING: high security risk here if you set to DEBUG=1,
high risk of symlink attack" then explaining how it works to hack?
That's what I would do, as I don't want to rewrite the entire file that
by the way works pretty well.

Please let me know so I can fix asap.

Thomas



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to