Re: Security hole in Debian's /bin/false?
>>>>> "EAP" == Eloy A Paris <firstname.lastname@example.org> writes:
EAP> I do not know much about security but Debian's /bin/false is also
EAP> a shell script. Are we at risk? Shouldn't /bin/false be changed
EAP> to a compiled version?
That's no risk. If you do a "C-c" at login, the shell process will be
ended too, and then you're out.
Emilio C. Lopes <mailto:Emilio.Lopes@Physik.TU-Muenchen.DE>
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
Trouble? e-mail to email@example.com .