Am 4. März 2016 09:48:16 MEZ, schrieb David Kastrup <d...@gnu.org>: >David Wright <lily...@lionunicorn.co.uk> writes: > >> OK. This one is quite pernicious, but depends on having the : at the >> beginning of $PATH, which might happen if someone thought the syntax >> was meant to be, say, PATH=:patha:pathb:and-so-on: >> >> $ echo $PATH >> :/usr/local/bin:/usr/bin:/bin: > >This is a terrible PATH: it searches the local directory for >executables >(which one should never ever ever do as it is a security hole you can >drive a truck through), and not once, but twice: before everything else >and afterwards _again_. > >> Your enemy puts cp somewhere like /tmp/cp, makes it world-executable, >> then waits for someone to cd /tmp and copy some files. > >I see that was the point you were trying to make, but it does not start >like that.
Well, in a way it does as I explicitly asked for that explanation. Urs -- Diese Nachricht wurde von meinem Android-Mobiltelefon mit K-9 Mail gesendet. _______________________________________________ lilypond-user mailing list lilypond-user@gnu.org https://lists.gnu.org/mailman/listinfo/lilypond-user