Hello security experts. In #345741 the submitter has requested that /sbin/init be enhanced such that it can be re-executed from another path. The idea is that "telinit -e INIT_PROG=/path/to/other/init" could be done prior to "telinit u".
Reasons for introducing this feature are given in the discussion of #345741. Obviously not just anyone can do "telinit -e". So it sounds safe. Nevertheless the sysvinit maintainers thought it would be a good idea to ask here whether anyone sees any security problems arising from this feature. -- Thomas Hood -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

