Am 4. März 2016 09:48:16 MEZ, schrieb David Kastrup <d...@gnu.org>:
>David Wright <lily...@lionunicorn.co.uk> writes:
>
>> OK. This one is quite pernicious, but depends on having the : at the
>> beginning of $PATH, which might happen if someone thought the syntax
>> was meant to be, say, PATH=:patha:pathb:and-so-on:
>>
>> $ echo $PATH
>> :/usr/local/bin:/usr/bin:/bin:
>
>This is a terrible PATH: it searches the local directory for
>executables
>(which one should never ever ever do as it is a security hole you can
>drive a truck through), and not once, but twice: before everything else
>and afterwards _again_.
>
>> Your enemy puts cp somewhere like /tmp/cp, makes it world-executable,
>> then waits for someone to cd /tmp and copy some files.
>
>I see that was the point you were trying to make, but it does not start
>like that.

Well, in a way it does as I explicitly asked for that explanation.

Urs

-- 
Diese Nachricht wurde von meinem Android-Mobiltelefon mit K-9 Mail gesendet.

_______________________________________________
lilypond-user mailing list
lilypond-user@gnu.org
https://lists.gnu.org/mailman/listinfo/lilypond-user

Reply via email to