|
Message-ID: <CAH8yC8=KKh8SPtDUUSAL_GuDHT7eYBrmHvVjzeQ5n4ocFh4m5Q@mail.gmail.com> Date: Wed, 1 Nov 2017 11:31:57 -0400 From: Jeffrey Walton <noloader@...il.com> To: oss-security@...ts.openwall.com Subject: Re: Fw: Security risk of vim swap files On Wed, Nov 1, 2017 at 10:49 AM, Tim <tim-security@...tinelchicken.org> wrote: >> > Also, it almost never makes sense to put things in /tmp, for several >> > reasons pointed out by others. Making ~/.vim/... the default location >> > clearly is the best solution. >> >> And all those reasons make no sense. /tmp has a sticky bit precisely so that >> people could put stuff there, as opposed to /run. > > We've been spending decades fixing filesystem races that arise from > cases where people use temporary files in world-writable directories. > You have to get a half dozen things exactly correct in order to use > /tmp. Why take the risk? Doesn't every normal (human) user account > have a home directory that is already protected? Some installs don't allow users to write to /tmp. For example, some machines on GCC's compile farm do not allow it. I seem to recall the error was a RO mount. Also see https://gcc.gnu.org/wiki/CompileFarm. Code and scripts certainly need to check TMPDIR and then have a fallback strategy if it is missing. Jeff
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.