lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAHk-=wjSWXYCPywfPj6TBE+Nsum71DsUqiv7furmA+ryFTPjVA@mail.gmail.com> Date: Sat, 28 Jan 2023 11:31:54 -0800 From: Linus Torvalds <torvalds@...ux-foundation.org> To: Joe Perches <joe@...ches.com> Cc: LKML <linux-kernel@...r.kernel.org>, Andrew Morton <akpm@...ux-foundation.org> Subject: Re: git source files with rw permissions On Fri, Jan 27, 2023 at 8:06 PM Joe Perches <joe@...ches.com> wrote: > > fyi: there's one more straggler: And I think there's one more. Here's another one-liner shell script for finding suspicious files: git ls-files -s | grep '^100755' | cut -f2 | xargs grep -L '^#!' and I don't think 'scripts/atomic/atomics.tbl' should be in that set. At least that file has a reasonable explanation for why it's executable - over-eager "mark all these scripts executable" without noticing that one of the files in question was just the input file to another script. Linus
Powered by blists - more mailing lists