Steve Langasek <[EMAIL PROTECTED]> writes:

> The example *is* wrong - the example given is never safe to run, because
> the only way to verify beforehand that /tmp/zenity is not a symlink to
> something more important is by first explicitly *creating* your file
> funder /tmp (non-destructively), then check that it's not a symlink, and
> *then* run pilot-qof.

I dunno, I'd feel quite comfortable running that command on my personal
laptop, which has no other users and no remote login access.  /tmp file
vulnerabilities are only vulnerabilities on multiuser systems.  We don't
know for *packages* whether they'll be installed on multiuser systems, so
of course we have to fix them regardless, but in examples I think it's
often reasonable to be sloppier.

-- 
Russ Allbery ([EMAIL PROTECTED])               <http://www.eyrie.org/~eagle/>


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to