Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20171103212659.378593da@pc1>
Date: Fri, 3 Nov 2017 21:26:59 +0100
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Subject: nvi crash recovery (was Re: Re: Security risk of
 server side text editing in general and vim.tiny specifically)

On Fri, 3 Nov 2017 11:12:43 -0700
Ian Zimmerman <itz@...y.loosely.org> wrote:

> How much of this (and the parallel thread of course) applies to nvi?

This is actually interesting:
nvi saves recovery files to /var/tmp/vi.recover and creates them with
600 permissions.
So all the problems discussed don't really apply here.
However the dir itself gets created by the first user using nvi. Not
sure if that causes any other problems (permissions are rwx for all and
sticky bit).

-- 
Hanno Böck
https://hboeck.de/

mail/jabber: hanno@...eck.de
GPG: FE73757FA60E4E21B937579FA5880072BBB51E42

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.