--=_courier-9859-1049735575-0001-2
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable
On Mon, 2003-04-07 at 18:50, Clayton Weaver wrote:
> The cases with potential security implications are all in the context of =
flink()ing to an open fd for an inode that still corresponds to at least on=
e directory entry.
almost.
there is of course always the case of a setuid app doing a userspace ACL
like thing and only sending fd's to non-privileged apps based on some
security scheme..... flink() would sort of break this thing entirely
--=_courier-9859-1049735575-0001-2
Content-Type: application/pgp-signature; name="signature.asc"
Content-Transfer-Encoding: 7bit
Content-Description: This is a digitally signed message part
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQA+kbFIxULwo51rQBIRAmvaAJ0UH7sAWqIkgHR0MvXx9E1Xhf7LRgCfdvKa
xZGPOGma+NAWNwTg6YwAOvk=
=KPSa
-----END PGP SIGNATURE-----
--=_courier-9859-1049735575-0001-2--