On Thu, 2008-03-20 at 17:05 +1100, Rusty Russell wrote: > + snprintf(memfile_path, PATH_MAX, "%s/.lguest", > getenv("HOME") ?: ""); Hi Rusty, Is that safe if being run via setuid/gid or shared root? It might be better to just look it up in /etc/passwd against the real UID, considering that anyone can change (or null) that env string. Of course its also practical to just say "DON'T RUN LGUEST AS SETUID/GID". Even if you say that, someone will do it. You might also add beware of sudoers. For people (like myself and lab mates) who are forced to share machines, it could breed a whole new strain of practical jokes :) That will cause lguest to inherit a memory leak from getpwuid(), but it only leaks once. Cheers, --Tim _______________________________________________ Virtualization mailing list Virtualization@xxxxxxxxxxxxxxxxxxxxxxxxxx https://lists.linux-foundation.org/mailman/listinfo/virtualization