The embedded references are formatted as
The embedded references are formatted as The embedded references are formatted as pathname_1->pathname_2->pathname_3...
pathname_1->pathname_2->pathname_3... binary pointed to by pathname_2, which in turn is a string
which indicates that pathname_1 is a string embedded in the The embedded references are formatted as which indicates that pathname_1 is a string embedded in the
The embedded references are formatted as which indicates that pathname_1 is a string embedded in the pathname_1->pathname_2->pathname_3... binary pointed to by pathname_2, which in turn is a string
The embedded references are formatted as pathname_1->pathname_2->pathname_3... pathname_1->pathname_2->pathname_3... pathname_3 refers to pathname_2 which refers to pathname_1. binary pointed to by pathname_2, which in turn is a string
which indicates that pathname_1 is a string embedded in the
pathname_1->pathname_2->pathname_3...
The embedded references are formatted as
Code [embed]
pathname_1->pathname_2->pathname_3...
pathname_1->pathname_2->pathname_3...
pathname_1->pathname_2->pathname_3...
pathname_1->pathname_2->pathname_3...
pathname_1->pathname_2->pathname_3...
binary pointed to by pathname_2, which in turn is a string
embedded in pathname_3. Or, to read it the other way around,
pathname_1->pathname_2->pathname_3...
binary pointed to by pathname_2, which in turn is a string
binary pointed to by pathname_2, which in turn is a string
which indicates that pathname_1 is a string embedded in the
Code [embed]
embedded in pathname_3. Or, to read it the other way around,
which indicates that pathname_1 is a string embedded in the
binary pointed to by pathname_2, which in turn is a string
Code [embed]
The embedded references are formatted as
pathname_1->pathname_2->pathname_3...
pathname_1->pathname_2->pathname_3...
pathname_1->pathname_2->pathname_3...
which indicates that pathname_1 is a string embedded in the
Code [embed]
pathname_1->pathname_2->pathname_3...
which indicates that pathname_1 is a string embedded in the
embedded in pathname_3. Or, to read it the other way around,
pathname_1->pathname_2->pathname_3...
embedded in pathname_3. Or, to read it the other way around,
embedded in pathname_3. Or, to read it the other way around,
Code [embed001w]
pathname_1->pathname_2->pathname_3...
pathname_3 refers to pathname_2 which refers to pathname_1.
pathname_3 refers to pathname_2 which refers to pathname_1.
binary pointed to by pathname_2, which in turn is a string
which indicates that pathname_1 is a string embedded in the
Code [embed]
The embedded references are formatted as
which indicates that pathname_1 is a string embedded in the
pathname_1->pathname_2->pathname_3...
which indicates that pathname_1 is a string embedded in the
pathname_3 refers to pathname_2 which refers to pathname_1.
binary pointed to by pathname_2, which in turn is a string
embedded in pathname_3. Or, to read it the other way around,
pathname_1->pathname_2->pathname_3...
The embedded references are formatted as
which indicates that pathname_1 is a string embedded in the
which indicates that pathname_1 is a string embedded in the
which indicates that pathname_1 is a string embedded in the
The embedded references are formatted as
which indicates that pathname_1 is a string embedded in the
binary pointed to by pathname_2, which in turn is a string
binary pointed to by pathname_2, which in turn is a string
which indicates that pathname_1 is a string embedded in the
which indicates that pathname_1 is a string embedded in the
pathname_3 refers to pathname_2 which refers to pathname_1.
which indicates that pathname_1 is a string embedded in the
pathname_3 refers to pathname_2 which refers to pathname_1.
pathname_3 refers to pathname_2 which refers to pathname_1.
See the 'embed' explanation for an explanation of the format of the
binary pointed to by pathname_2, which in turn is a string
pathname_3 refers to pathname_2 which refers to pathname_1.
binary pointed to by pathname_2, which in turn is a string
pathname_1->pathname_2->pathname_3...
binary pointed to by pathname_2, which in turn is a string
binary pointed to by pathname_2, which in turn is a string
which indicates that pathname_1 is a string embedded in the
which indicates that pathname_1 is a string embedded in the
binary pointed to by pathname_2, which in turn is a string
which indicates that pathname_1 is a string embedded in the
which indicates that pathname_1 is a string embedded in the
embedded in pathname_3. Or, to read it the other way around,
embedded in pathname_3. Or, to read it the other way around,
binary pointed to by pathname_2, which in turn is a string
binary pointed to by pathname_2, which in turn is a string
binary pointed to by pathname_2, which in turn is a string
Code [embed001w]
Code [embed001w]
Code [embed001w]
which indicates that pathname_1 is a string embedded in the
embedded in pathname_3. Or, to read it the other way around,
pathname_3 refers to pathname_2 which refers to pathname_1.
embedded in pathname_3. Or, to read it the other way around,
pathname_1->pathname_2->pathname_3...
which indicates that pathname_1 is a string embedded in the
binary pointed to by pathname_2, which in turn is a string
pathname_1->pathname_2->pathname_3...
which indicates that pathname_1 is a string embedded in the
binary pointed to by pathname_2, which in turn is a string
pathname_3 refers to pathname_2 which refers to pathname_1.
embedded in pathname_3. Or, to read it the other way around,
binary pointed to by pathname_2, which in turn is a string
embedded in pathname_3. Or, to read it the other way around,
pathname_3 refers to pathname_2 which refers to pathname_1.
binary pointed to by pathname_2, which in turn is a string
embedded in pathname_3. Or, to read it the other way around,
Code [embed001w]
embedded in pathname_3. Or, to read it the other way around,
embedded in pathname_3. Or, to read it the other way around,
Code [embed001w]
binary pointed to by pathname_2, which in turn is a string
Code [embed001w]
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
binary pointed to by pathname_2, which in turn is a string
pathname_3 refers to pathname_2 which refers to pathname_1.
pathname_3 refers to pathname_2 which refers to pathname_1.
binary pointed to by pathname_2, which in turn is a string
Code [embed001w]
pathname_1->pathname_2->pathname_3...
which indicates that pathname_1 is a string embedded in the
pathname_3 refers to pathname_2 which refers to pathname_1.
embedded in pathname_3. Or, to read it the other way around,
binary pointed to by pathname_2, which in turn is a string
embedded in pathname_3. Or, to read it the other way around,
pathname_3 refers to pathname_2 which refers to pathname_1.
Code [embed001w]
Code [embed001w]
See the 'embed' explanation for an explanation of the format of the
Code [embed001w]
which indicates that pathname_1 is a string embedded in the
pathname_3 refers to pathname_2 which refers to pathname_1.
Code [embed001w]
pathname_3 refers to pathname_2 which refers to pathname_1.
pathname_3 refers to pathname_2 which refers to pathname_1.
pathname_3 refers to pathname_2 which refers to pathname_1.
Code [embed001w]
See the 'embed' explanation for an explanation of the format of the
pathname_3 refers to pathname_2 which refers to pathname_1.
owned by root. This can enable an intruder to gain unauthorized privileges
binary pointed to by pathname_2, which in turn is a string
pathname_3 refers to pathname_2 which refers to pathname_1.
Code [embed001w]
Code [embed001w]
Code [embed001w]
See the 'embed' explanation for an explanation of the format of the
binary pointed to by pathname_2, which in turn is a string
Code [embed001w]
which indicates that pathname_1 is a string embedded in the
embedded references.
Code [embed001w]
binary pointed to by pathname_2, which in turn is a string
embedded in pathname_3. Or, to read it the other way around,
Code [embed001w]
pathname_3 refers to pathname_2 which refers to pathname_1.
Code [embed001w]
Code [embed001w]
Code [embed001w]
See the 'embed' explanation for an explanation of the format of the
embedded references.
The indicated pathname to an executable contains a component which is not
The indicated pathname to an executable contains a component which is not
Code [embed001w]
See the 'embed' explanation for an explanation of the format of the
Code [embed001w]
embedded in pathname_3. Or, to read it the other way around,
embedded references.
See the 'embed' explanation for an explanation of the format of the
pathname_3 refers to pathname_2 which refers to pathname_1.
Code [embed001w]
Code [embed001w]
See the 'embed' explanation for an explanation of the format of the
embedded references.
Code [embed001w]
See the 'embed' explanation for an explanation of the format of the
The indicated pathname to an executable contains a component which is not
See the 'embed' explanation for an explanation of the format of the
embedded references.
The indicated pathname to an executable contains a component which is not
The indicated pathname to an executable contains a component which is not
Code [embed001w]
owned by root. This can enable an intruder to gain unauthorized privileges
owned by root. This can enable an intruder to gain unauthorized privileges
Code [embed001w]
embedded references.
embedded references.
for a discussion of the reasons that executables run by root should be
embedded references.
pathname_3 refers to pathname_2 which refers to pathname_1.
owned by root. This can enable an intruder to gain unauthorized privileges
pathname_3 refers to pathname_2 which refers to pathname_1.
embedded in pathname_3. Or, to read it the other way around,
See the 'embed' explanation for an explanation of the format of the
embedded references.
Code [embed001w]
embedded references.
embedded references.
pathname_3 refers to pathname_2 which refers to pathname_1.
The indicated pathname to an executable contains a component which is not
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
embedded references.
See the 'embed' explanation for an explanation of the format of the
owned by root. This can enable an intruder to gain unauthorized privileges
embedded references.
See the 'embed' explanation for an explanation of the format of the
owned by root. This can enable an intruder to gain unauthorized privileges
The indicated pathname to an executable contains a component which is not
embedded references.
owned by root. This can enable an intruder to gain unauthorized privileges
if they are able to replace the binary. See the 'rationale' explanation
if they are able to replace the binary. See the 'rationale' explanation
See the 'embed' explanation for an explanation of the format of the
owned by root.
The indicated pathname to an executable contains a component which is not
Code [embed001w]
See the 'embed' explanation for an explanation of the format of the
The indicated pathname to an executable contains a component which is not
embedded references.
embedded references.
embedded references.
if they are able to replace the binary. See the 'rationale' explanation
embedded references.
The indicated pathname to an executable contains a component which is not
embedded references.
The indicated pathname to an executable contains a component which is not
if they are able to replace the binary. See the 'rationale' explanation
if they are able to replace the binary. See the 'rationale' explanation
owned by root. This can enable an intruder to gain unauthorized privileges
for a discussion of the reasons that executables run by root should be
for a discussion of the reasons that executables run by root should be
embedded references.
Code [embed001w]
The indicated pathname to an executable contains a component which is not
The indicated pathname to an executable contains a component which is not
Code [embed001w]
owned by root. This can enable an intruder to gain unauthorized privileges
The indicated pathname to an executable contains a component which is not
for a discussion of the reasons that executables run by root should be
Code [embed001w]
The indicated pathname to an executable contains a component which is not
embedded references.
See the 'embed' explanation for an explanation of the format of the
The indicated pathname to an executable contains a component which is not
owned by root. This can enable an intruder to gain unauthorized privileges
The indicated pathname to an executable contains a component which is not
The indicated pathname to an executable contains a component which is not
if they are able to replace the binary. See the 'rationale' explanation
owned by root. This can enable an intruder to gain unauthorized privileges
for a discussion of the reasons that executables run by root should be
if they are able to replace the binary. See the 'rationale' explanation
owned by root. This can enable an intruder to gain unauthorized privileges
for a discussion of the reasons that executables run by root should be
for a discussion of the reasons that executables run by root should be
The indicated pathname to an executable contains a component which is not
owned by root.
See the 'embed' explanation for an explanation of the format of the
The indicated pathname to an executable contains a component which is not
See the 'embed' explanation for an explanation of the format of the
owned by root. This can enable an intruder to gain unauthorized privileges
owned by root.
Code [embed001i]
Code [embed001w]
owned by root.
owned by root. This can enable an intruder to gain unauthorized privileges
if they are able to replace the binary. See the 'rationale' explanation
owned by root. This can enable an intruder to gain unauthorized privileges
See the 'embed' explanation for an explanation of the format of the
The indicated pathname to an executable contains a component which is not
owned by root. This can enable an intruder to gain unauthorized privileges
embedded references.
owned by root. This can enable an intruder to gain unauthorized privileges
owned by root. This can enable an intruder to gain unauthorized privileges
The indicated pathname to an executable contains a component which is not
if they are able to replace the binary. See the 'rationale' explanation
The indicated pathname to an executable contains a component which is not
owned by root. This can enable an intruder to gain unauthorized privileges
for a discussion of the reasons that executables run by root should be
The indicated pathname to an executable contains a component which is not
The indicated pathname to an executable contains a component which is not
The indicated pathname to an executable contains a component which is not
if they are able to replace the binary. See the 'rationale' explanation
owned by root.
if they are able to replace the binary. See the 'rationale' explanation
owned by root.
owned by root.
for a discussion of the reasons that executables run by root should be
owned by root. This can enable an intruder to gain unauthorized privileges
if they are able to replace the binary. See the 'rationale' explanation
owned by root. This can enable an intruder to gain unauthorized privileges
if they are able to replace the binary. See the 'rationale' explanation
The indicated pathname to an executable contains a component which is not
for a discussion of the reasons that executables run by root should be
if they are able to replace the binary. See the 'rationale' explanation
owned by root. This can enable an intruder to gain unauthorized privileges
owned by root. This can enable an intruder to gain unauthorized privileges
owned by root. This can enable an intruder to gain unauthorized privileges
owned by root.
Code [embed001i]
Code [embed001i]
for a discussion of the reasons that executables run by root should be
owned by root. This can enable an intruder to gain unauthorized privileges
if they are able to replace the binary. See the 'rationale' explanation
embedded references.
embedded references.
Code [embed001i]
for a discussion of the reasons that executables run by root should be
for a discussion of the reasons that executables run by root should be
owned by root.
if they are able to replace the binary. See the 'rationale' explanation
The indicated pathname to an executable contains a component which is not
for a discussion of the reasons that executables run by root should be
if they are able to replace the binary. See the 'rationale' explanation
owned by root.
owned by root. This can enable an intruder to gain unauthorized privileges
for a discussion of the reasons that executables run by root should be
if they are able to replace the binary. See the 'rationale' explanation
for a discussion of the reasons that executables run by root should be
if they are able to replace the binary. See the 'rationale' explanation
for a discussion of the reasons that executables run by root should be
Code [embed001i]
owned by root.
if they are able to replace the binary. See the 'rationale' explanation
Code [embed001i]
owned by root.
Code [embed001i]
See the 'embed' explanation for an explanation of the format of the
for a discussion of the reasons that executables run by root should be
The indicated pathname to an executable contains a component which is not
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
The indicated pathname to an executable contains a component which is not
owned by root.
owned by root.
owned by root. This can enable an intruder to gain unauthorized privileges
Code [embed001i]
Code [embed001i]
owned by root. This can enable an intruder to gain unauthorized privileges
Code [embed001i]
embedded references.
Code [embed001i]
owned by root.
See the 'embed' explanation for an explanation of the format of the
Code [embed001i]
owned by root.
owned by root.
owned by root.
Code [embed001i]
embedded references.
embedded references.
Code [embed001i]
See the 'embed' explanation for an explanation of the format of the
owned by root.
if they are able to replace the binary. See the 'rationale' explanation
Code [embed001i]
Code [embed001i]
is not owned by root. This may indicate a vulnerability in the system.
if they are able to replace the binary. See the 'rationale' explanation
for a discussion of the reasons that executables run by root should be
Code [embed001i]
owned by root. This can enable an intruder to gain unauthorized privileges
Code [embed001i]
Code [embed001i]
Code [embed001i]
See the 'embed' explanation for an explanation of the format of the
Code [embed001i]
Code [embed001i]
for a discussion of the reasons that executables run by root should be
Code [embed001i]
It will be necessary to study the programs in which the pathname was
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
if they are able to replace the binary. See the 'rationale' explanation
for a discussion of the reasons that executables run by root should be
Code [embed001i]
owned by root.
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
embedded references.
See the 'embed' explanation for an explanation of the format of the
The indicated pathname to a file or directory contains a component which
Code [embed001i]
Code [embed001i]
Code [embed001i]
Code [embed001i]
embedded references.
The indicated pathname to a file or directory contains a component which
See the 'embed' explanation for an explanation of the format of the
embedded references.
The indicated pathname to a file or directory contains a component which
owned by root.
The indicated pathname to a file or directory contains a component which
is not owned by root. This may indicate a vulnerability in the system.
embedded references.
See the 'embed' explanation for an explanation of the format of the
Code [embed001i]
owned by root.
embedded references.
is not owned by root. This may indicate a vulnerability in the system.
found to determine whether there is a problem.
See the 'embed' explanation for an explanation of the format of the
embedded references.
owned by root.
See the 'embed' explanation for an explanation of the format of the
embedded references.
Code [embed001i]
is not owned by root. This may indicate a vulnerability in the system.
embedded references.
for a discussion of the reasons that executables run by root should be
The indicated pathname to a file or directory contains a component which
See the 'embed' explanation for an explanation of the format of the
embedded references.
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
embedded references.
See the 'embed' explanation for an explanation of the format of the
is not owned by root. This may indicate a vulnerability in the system.
is not owned by root. This may indicate a vulnerability in the system.
embedded references.
See the 'embed' explanation for an explanation of the format of the
Code [embed001i]
It will be necessary to study the programs in which the pathname was
embedded references.
embedded references.
is not owned by root. This may indicate a vulnerability in the system.
It will be necessary to study the programs in which the pathname was
embedded references.
embedded references.
The indicated pathname to a file or directory contains a component which
embedded references.
The indicated pathname to a file or directory contains a component which
embedded references.
Code [embed001i]
It will be necessary to study the programs in which the pathname was
The indicated pathname to a file or directory contains a component which
is not owned by root. This may indicate a vulnerability in the system.
It will be necessary to study the programs in which the pathname was
found to determine whether there is a problem.
It will be necessary to study the programs in which the pathname was
Code [embed001i]
The indicated pathname to a file or directory contains a component which
embedded references.
Code [embed001i]
found to determine whether there is a problem.
The indicated pathname to a file or directory contains a component which
Code [embed002w]
See the 'embed' explanation for an explanation of the format of the
The indicated pathname to a file or directory contains a component which
The indicated pathname to a file or directory contains a component which
is not owned by root. This may indicate a vulnerability in the system.
embedded references.
The indicated pathname to a file or directory contains a component which
found to determine whether there is a problem.
It will be necessary to study the programs in which the pathname was
The indicated pathname to a file or directory contains a component which
The indicated pathname to a file or directory contains a component which
is not owned by root. This may indicate a vulnerability in the system.
See the 'embed' explanation for an explanation of the format of the
is not owned by root. This may indicate a vulnerability in the system.
found to determine whether there is a problem.
is not owned by root. This may indicate a vulnerability in the system.
found to determine whether there is a problem.
It will be necessary to study the programs in which the pathname was
is not owned by root. This may indicate a vulnerability in the system.
found to determine whether there is a problem.
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
The indicated pathname to a file or directory contains a component which
is not owned by root. This may indicate a vulnerability in the system.
See the 'embed' explanation for an explanation of the format of the
is not owned by root. This may indicate a vulnerability in the system.
It will be necessary to study the programs in which the pathname was
The indicated pathname to a file or directory contains a component which
is not owned by root. This may indicate a vulnerability in the system.
found to determine whether there is a problem.
Code [embed001i]
is not owned by root. This may indicate a vulnerability in the system.
is not owned by root. This may indicate a vulnerability in the system.
The indicated pathname to a file or directory contains a component which
The indicated pathname to a file or directory contains a component which
It will be necessary to study the programs in which the pathname was
Code [embed002w]
is not owned by root. This may indicate a vulnerability in the system.
It will be necessary to study the programs in which the pathname was
found to determine whether there is a problem.
Code [embed002w]
is not owned by root. This may indicate a vulnerability in the system.
It will be necessary to study the programs in which the pathname was
embedded references.
It will be necessary to study the programs in which the pathname was
is not owned by root. This may indicate a vulnerability in the system.
It will be necessary to study the programs in which the pathname was
The indicated pathname to a file or directory contains a component which
It will be necessary to study the programs in which the pathname was
Code [embed002w]
found to determine whether there is a problem.
is not owned by root. This may indicate a vulnerability in the system.
Code [embed002w]
It will be necessary to study the programs in which the pathname was
It will be necessary to study the programs in which the pathname was
See the 'embed' explanation for an explanation of the format of the
is not owned by root. This may indicate a vulnerability in the system.
is not owned by root. This may indicate a vulnerability in the system.
found to determine whether there is a problem.
found to determine whether there is a problem.
It will be necessary to study the programs in which the pathname was
Code [embed002w]
is not owned by root. This may indicate a vulnerability in the system.
found to determine whether there is a problem.
Code [embed002w]
found to determine whether there is a problem.
See the 'embed' explanation for an explanation of the format of the
It will be necessary to study the programs in which the pathname was
found to determine whether there is a problem.
The indicated pathname to a file or directory contains a component which
found to determine whether there is a problem.
found to determine whether there is a problem.
It will be necessary to study the programs in which the pathname was
is not owned by root. This may indicate a vulnerability in the system.
Code [embed002w]
found to determine whether there is a problem.
Code [embed002w]
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
It will be necessary to study the programs in which the pathname was
found to determine whether there is a problem.
Code [embed002w]
See the 'embed' explanation for an explanation of the format of the
found to determine whether there is a problem.
embedded references.
embedded references.
Code [embed002w]
Code [embed002w]
found to determine whether there is a problem.
Code [embed002w]
embedded references.
Code [embed002w]
enable an intruder to gain unauthorized privileges if they are able to
Code [embed002w]
Code [embed002w]
Code [embed002w]
It will be necessary to study the programs in which the pathname was
Code [embed002w]
found to determine whether there is a problem.
Code [embed002w]
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
Code [embed002w]
Code [embed002w]
embedded references.
Code [embed002w]
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
Code [embed002w]
See the 'embed' explanation for an explanation of the format of the
overwrite the executable. See the 'rationale' explanation for a
See the 'embed' explanation for an explanation of the format of the
It will be necessary to study the programs in which the pathname was
The indicated executable is not owned by owned by root. This can
Code [embed002w]
See the 'embed' explanation for an explanation of the format of the
found to determine whether there is a problem.
Code [embed002w]
See the 'embed' explanation for an explanation of the format of the
embedded references.
See the 'embed' explanation for an explanation of the format of the
Code [embed002w]
embedded references.
The indicated executable is not owned by owned by root. This can
embedded references.
See the 'embed' explanation for an explanation of the format of the
Code [embed002w]
Code [embed002w]
The indicated executable is not owned by owned by root. This can
found to determine whether there is a problem.
is not owned by root. This may indicate a vulnerability in the system.
embedded references.
See the 'embed' explanation for an explanation of the format of the
The indicated executable is not owned by owned by root. This can
embedded references.
Code [embed002w]
See the 'embed' explanation for an explanation of the format of the
The indicated executable is not owned by owned by root. This can
enable an intruder to gain unauthorized privileges if they are able to
discussion of the reasons that executables run by root should be owned
Code [embed002w]
found to determine whether there is a problem.
See the 'embed' explanation for an explanation of the format of the
embedded references.
found to determine whether there is a problem.
See the 'embed' explanation for an explanation of the format of the
The indicated executable is not owned by owned by root. This can
See the 'embed' explanation for an explanation of the format of the
embedded references.
enable an intruder to gain unauthorized privileges if they are able to
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
It will be necessary to study the programs in which the pathname was
embedded references.
See the 'embed' explanation for an explanation of the format of the
embedded references.
enable an intruder to gain unauthorized privileges if they are able to
enable an intruder to gain unauthorized privileges if they are able to
overwrite the executable. See the 'rationale' explanation for a
Code [embed002w]
See the 'embed' explanation for an explanation of the format of the
embedded references.
by root.
embedded references.
embedded references.
overwrite the executable. See the 'rationale' explanation for a
The indicated executable is not owned by owned by root. This can
enable an intruder to gain unauthorized privileges if they are able to
The indicated executable is not owned by owned by root. This can
embedded references.
overwrite the executable. See the 'rationale' explanation for a
embedded references.
Code [embed002w]
embedded references.
The indicated executable is not owned by owned by root. This can
enable an intruder to gain unauthorized privileges if they are able to
The indicated executable is not owned by owned by root. This can
embedded references.
found to determine whether there is a problem.
overwrite the executable. See the 'rationale' explanation for a
The indicated executable is not owned by owned by root. This can
overwrite the executable. See the 'rationale' explanation for a
discussion of the reasons that executables run by root should be owned
overwrite the executable. See the 'rationale' explanation for a
Code [embed002w]
Code [embed002w]
embedded references.
See the 'embed' explanation for an explanation of the format of the
The indicated executable is not owned by owned by root. This can
The indicated executable is not owned by owned by root. This can
The indicated executable is not owned by owned by root. This can
The indicated executable is not owned by owned by root. This can
The indicated executable is not owned by owned by root. This can
discussion of the reasons that executables run by root should be owned
enable an intruder to gain unauthorized privileges if they are able to
overwrite the executable. See the 'rationale' explanation for a
The indicated executable is not owned by owned by root. This can
enable an intruder to gain unauthorized privileges if they are able to
discussion of the reasons that executables run by root should be owned
See the 'embed' explanation for an explanation of the format of the
enable an intruder to gain unauthorized privileges if they are able to
enable an intruder to gain unauthorized privileges if they are able to
overwrite the executable. See the 'rationale' explanation for a
discussion of the reasons that executables run by root should be owned
The indicated executable is not owned by owned by root. This can
See the 'embed' explanation for an explanation of the format of the
enable an intruder to gain unauthorized privileges if they are able to
enable an intruder to gain unauthorized privileges if they are able to
The indicated executable is not owned by owned by root. This can
The indicated executable is not owned by owned by root. This can
enable an intruder to gain unauthorized privileges if they are able to
enable an intruder to gain unauthorized privileges if they are able to
enable an intruder to gain unauthorized privileges if they are able to
by root.
overwrite the executable. See the 'rationale' explanation for a
The indicated executable is not owned by owned by root. This can
discussion of the reasons that executables run by root should be owned
enable an intruder to gain unauthorized privileges if they are able to
overwrite the executable. See the 'rationale' explanation for a
by root.
embedded references.
The indicated executable is not owned by owned by root. This can
overwrite the executable. See the 'rationale' explanation for a
Code [embed002w]
The indicated executable is not owned by owned by root. This can
enable an intruder to gain unauthorized privileges if they are able to
by root.
The indicated executable is not owned by owned by root. This can
enable an intruder to gain unauthorized privileges if they are able to
overwrite the executable. See the 'rationale' explanation for a
discussion of the reasons that executables run by root should be owned
overwrite the executable. See the 'rationale' explanation for a
by root.
embedded references.
by root.
embedded references.
The indicated executable is not owned by owned by root. This can
enable an intruder to gain unauthorized privileges if they are able to
ownershop should *NOT* be changed to root unless the setuid bit
overwrite the executable. See the 'rationale' explanation for a
overwrite the executable. See the 'rationale' explanation for a
enable an intruder to gain unauthorized privileges if they are able to
overwrite the executable. See the 'rationale' explanation for a
overwrite the executable. See the 'rationale' explanation for a
enable an intruder to gain unauthorized privileges if they are able to
overwrite the executable. See the 'rationale' explanation for a
enable an intruder to gain unauthorized privileges if they are able to
by root.
discussion of the reasons that executables run by root should be owned
overwrite the executable. See the 'rationale' explanation for a
discussion of the reasons that executables run by root should be owned
enable an intruder to gain unauthorized privileges if they are able to
discussion of the reasons that executables run by root should be owned
enable an intruder to gain unauthorized privileges if they are able to
overwrite the executable. See the 'rationale' explanation for a
overwrite the executable. See the 'rationale' explanation for a
discussion of the reasons that executables run by root should be owned
enable an intruder to gain unauthorized privileges if they are able to
discussion of the reasons that executables run by root should be owned
by root.
See the 'embed' explanation for an explanation of the format of the
Note that if the executable is setuid to a non-root ID, then the
overwrite the executable. See the 'rationale' explanation for a
is also removed.
enable an intruder to gain unauthorized privileges if they are able to
The indicated executable is not owned by owned by root. This can
discussion of the reasons that executables run by root should be owned
discussion of the reasons that executables run by root should be owned
overwrite the executable. See the 'rationale' explanation for a
discussion of the reasons that executables run by root should be owned
overwrite the executable. See the 'rationale' explanation for a
Note that if the executable is setuid to a non-root ID, then the
discussion of the reasons that executables run by root should be owned
discussion of the reasons that executables run by root should be owned
discussion of the reasons that executables run by root should be owned
overwrite the executable. See the 'rationale' explanation for a
by root.
by root.
The indicated executable is not owned by owned by root. This can
Note that if the executable is setuid to a non-root ID, then the
overwrite the executable. See the 'rationale' explanation for a
by root.
overwrite the executable. See the 'rationale' explanation for a
discussion of the reasons that executables run by root should be owned
discussion of the reasons that executables run by root should be owned
overwrite the executable. See the 'rationale' explanation for a
Note that if the executable is setuid to a non-root ID, then the
by root.
by root.
embedded references.
The indicated executable is not owned by owned by root. This can
Note that if the executable is setuid to a non-root ID, then the
Note that if the executable is setuid to a non-root ID, then the
The indicated executable is not owned by owned by root. This can
discussion of the reasons that executables run by root should be owned
overwrite the executable. See the 'rationale' explanation for a
enable an intruder to gain unauthorized privileges if they are able to
ownershop should *NOT* be changed to root unless the setuid bit
by root.
enable an intruder to gain unauthorized privileges if they are able to
discussion of the reasons that executables run by root should be owned
ownershop should *NOT* be changed to root unless the setuid bit
discussion of the reasons that executables run by root should be owned
Note that if the executable is setuid to a non-root ID, then the
discussion of the reasons that executables run by root should be owned
by root.
ownershop should *NOT* be changed to root unless the setuid bit
by root.
enable an intruder to gain unauthorized privileges if they are able to
enable an intruder to gain unauthorized privileges if they are able to
ownershop should *NOT* be changed to root unless the setuid bit
ownershop should *NOT* be changed to root unless the setuid bit
Code [embed002i]
overwrite the executable. See the 'rationale' explanation for a
by root.
discussion of the reasons that executables run by root should be owned
is also removed.
by root.
by root.
is also removed.
by root.
overwrite the executable. See the 'rationale' explanation for a
Note that if the executable is setuid to a non-root ID, then the
by root.
Note that if the executable is setuid to a non-root ID, then the
ownershop should *NOT* be changed to root unless the setuid bit
is also removed.
by root.
Note that if the executable is setuid to a non-root ID, then the
ownershop should *NOT* be changed to root unless the setuid bit
by root.
Note that if the executable is setuid to a non-root ID, then the
overwrite the executable. See the 'rationale' explanation for a
The indicated executable is not owned by owned by root. This can
is also removed.
Note that if the executable is setuid to a non-root ID, then the
is also removed.
is also removed.
overwrite the executable. See the 'rationale' explanation for a
discussion of the reasons that executables run by root should be owned
See the 'embed' explanation for an explanation of the format of the
Note that if the executable is setuid to a non-root ID, then the
Note that if the executable is setuid to a non-root ID, then the
Note that if the executable is setuid to a non-root ID, then the
by root.
Note that if the executable is setuid to a non-root ID, then the
discussion of the reasons that executables run by root should be owned
is also removed.
ownershop should *NOT* be changed to root unless the setuid bit
ownershop should *NOT* be changed to root unless the setuid bit
Note that if the executable is setuid to a non-root ID, then the
Note that if the executable is setuid to a non-root ID, then the
is also removed.
Code [embed002i]
ownershop should *NOT* be changed to root unless the setuid bit
ownershop should *NOT* be changed to root unless the setuid bit
Code [embed002i]
ownershop should *NOT* be changed to root unless the setuid bit
ownershop should *NOT* be changed to root unless the setuid bit
Note that if the executable is setuid to a non-root ID, then the
ownershop should *NOT* be changed to root unless the setuid bit
ownershop should *NOT* be changed to root unless the setuid bit
Note that if the executable is setuid to a non-root ID, then the
Code [embed002i]
by root.
Note that if the executable is setuid to a non-root ID, then the
is also removed.
Note that if the executable is setuid to a non-root ID, then the
Note that if the executable is setuid to a non-root ID, then the
is also removed.
is also removed.
Code [embed002i]
Code [embed002i]
is also removed.
Code [embed002i]
is also removed.
overwrite the executable. See the 'rationale' explanation for a
by root.
See the 'embed' explanation for an explanation of the format of the
is also removed.
Note that if the executable is setuid to a non-root ID, then the
See the 'embed' explanation for an explanation of the format of the
is also removed.
is also removed.
is also removed.
ownershop should *NOT* be changed to root unless the setuid bit
is also removed.
ownershop should *NOT* be changed to root unless the setuid bit
is also removed.
See the 'embed' explanation for an explanation of the format of the
ownershop should *NOT* be changed to root unless the setuid bit
ownershop should *NOT* be changed to root unless the setuid bit
ownershop should *NOT* be changed to root unless the setuid bit
Code [embed002i]
Code [embed002i]
is also removed.
The indicated file or directory is not owned by root. This may
embedded references.
Code [embed002i]
is also removed.
Code [embed002i]
See the 'embed' explanation for an explanation of the format of the
is also removed.
is also removed.
Code [embed002i]
Code [embed002i]
embedded references.
Code [embed002i]
by root.
is also removed.
Note that if the executable is setuid to a non-root ID, then the
Code [embed002i]
Code [embed002i]
Code [embed002i]
Code [embed002i]
is also removed.
Code [embed002i]
Code [embed002i]
Code [embed002i]
embedded references.
See the 'embed' explanation for an explanation of the format of the
Code [embed002i]
See the 'embed' explanation for an explanation of the format of the
embedded references.
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
Code [embed002i]
Code [embed002i]
Code [embed002i]
embedded references.
See the 'embed' explanation for an explanation of the format of the
Code [embed002i]
is also removed.
The indicated file or directory is not owned by root. This may
See the 'embed' explanation for an explanation of the format of the
Code [embed002i]
embedded references.
Code [embed002i]
See the 'embed' explanation for an explanation of the format of the
The indicated file or directory is not owned by root. This may
The indicated file or directory is not owned by root. This may
embedded references.
The indicated file or directory is not owned by root. This may
See the 'embed' explanation for an explanation of the format of the
embedded references.
embedded references.
Code [embed002i]
Note that if the executable is setuid to a non-root ID, then the
Code [embed002i]
there is a problem.
is also removed.
indicate a vulnerability in the system. It will be necessary to study
embedded references.
embedded references.
The indicated file or directory is not owned by root. This may
See the 'embed' explanation for an explanation of the format of the
indicate a vulnerability in the system. It will be necessary to study
indicate a vulnerability in the system. It will be necessary to study
embedded references.
indicate a vulnerability in the system. It will be necessary to study
The indicated file or directory is not owned by root. This may
See the 'embed' explanation for an explanation of the format of the
Code [embed002i]
ownershop should *NOT* be changed to root unless the setuid bit
See the 'embed' explanation for an explanation of the format of the
the programs in which the pathname was found to determine whether
Code [embed002i]
embedded references.
embedded references.
embedded references.
The indicated file or directory is not owned by root. This may
embedded references.
the programs in which the pathname was found to determine whether
The indicated file or directory is not owned by root. This may
embedded references.
indicate a vulnerability in the system. It will be necessary to study
the programs in which the pathname was found to determine whether
the programs in which the pathname was found to determine whether
the programs in which the pathname was found to determine whether
The indicated file or directory is not owned by root. This may
The indicated file or directory is not owned by root. This may
embedded references.
The indicated file or directory is not owned by root. This may
indicate a vulnerability in the system. It will be necessary to study
See the 'embed' explanation for an explanation of the format of the
Code [embed003w]
is also removed.
Code [embed002i]
embedded references.
there is a problem.
Code [embed002i]
The indicated file or directory is not owned by root. This may
The indicated file or directory is not owned by root. This may
The indicated file or directory is not owned by root. This may
See the 'embed' explanation for an explanation of the format of the
The indicated file or directory is not owned by root. This may
there is a problem.
The indicated file or directory is not owned by root. This may
The indicated file or directory is not owned by root. This may
indicate a vulnerability in the system. It will be necessary to study
indicate a vulnerability in the system. It will be necessary to study
there is a problem.
The indicated file or directory is not owned by root. This may
the programs in which the pathname was found to determine whether
The indicated file or directory is not owned by root. This may
indicate a vulnerability in the system. It will be necessary to study
there is a problem.
indicate a vulnerability in the system. It will be necessary to study
there is a problem.
embedded references.
The indicated file or directory is not owned by root. This may
the programs in which the pathname was found to determine whether
there is a problem.
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
Code [embed003w]
Code [embed002i]
there is a problem.
the programs in which the pathname was found to determine whether
embedded references.
the programs in which the pathname was found to determine whether
The indicated file or directory is not owned by root. This may
embedded references.
embedded references.
the programs in which the pathname was found to determine whether
Code [embed003w]
indicate a vulnerability in the system. It will be necessary to study
the programs in which the pathname was found to determine whether
the programs in which the pathname was found to determine whether
the programs in which the pathname was found to determine whether
the programs in which the pathname was found to determine whether
there is a problem.
the programs in which the pathname was found to determine whether
indicate a vulnerability in the system. It will be necessary to study
indicate a vulnerability in the system. It will be necessary to study
Code [embed003w]
indicate a vulnerability in the system. It will be necessary to study
there is a problem.
the programs in which the pathname was found to determine whether
the programs in which the pathname was found to determine whether
indicate a vulnerability in the system. It will be necessary to study
Code [embed003w]
Code [embed003w]
See the 'embed' explanation for an explanation of the format of the
there is a problem.
Code [embed003w]
there is a problem.
indicate a vulnerability in the system. It will be necessary to study
The indicated file or directory is not owned by root. This may
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
there is a problem.
there is a problem.
there is a problem.
the programs in which the pathname was found to determine whether
there is a problem.
Code [embed003w]
Code [embed003w]
See the 'embed' explanation for an explanation of the format of the
Code [embed003w]
there is a problem.
Code [embed003w]
there is a problem.
Code [embed003w]
See the 'embed' explanation for an explanation of the format of the
embedded references.
Code [embed003w]
Code [embed003w]
Code [embed003w]
Code [embed003w]
Code [embed003w]
See the 'embed' explanation for an explanation of the format of the
Code [embed003w]
Code [embed003w]
the programs in which the pathname was found to determine whether
Code [embed003w]
Code [embed003w]
Code [embed003w]
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
Code [embed003w]
The indicated file or directory is not owned by root. This may
The indicated pathname to an executable contains a component which
to gain unauthorized privileges if they are able to replace the
the programs in which the pathname was found to determine whether
Code [embed003w]
the programs in which the pathname was found to determine whether
The indicated pathname to an executable contains a component which
embedded references.
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
Code [embed003w]
See the 'embed' explanation for an explanation of the format of the
there is a problem.
Code [embed003w]
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
embedded references.
Code [embed003w]
See the 'embed' explanation for an explanation of the format of the
Code [embed003w]
See the 'embed' explanation for an explanation of the format of the
The indicated pathname to an executable contains a component which
The indicated pathname to an executable contains a component which
The indicated pathname to an executable contains a component which
Code [embed003w]
embedded references.
The indicated pathname to an executable contains a component which
embedded references.
See the 'embed' explanation for an explanation of the format of the
Code [embed003w]
is group writable, world writable or both. This can enable an intruder
embedded references.
executable.
there is a problem.
indicate a vulnerability in the system. It will be necessary to study
embedded references.
embedded references.
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
embedded references.
embedded references.
See the 'embed' explanation for an explanation of the format of the
embedded references.
The indicated pathname to an executable contains a component which
is group writable, world writable or both. This can enable an intruder
is group writable, world writable or both. This can enable an intruder
is group writable, world writable or both. This can enable an intruder
is group writable, world writable or both. This can enable an intruder
See the 'embed' explanation for an explanation of the format of the
The indicated pathname to an executable contains a component which
Code [embed003w]
embedded references.
See the 'embed' explanation for an explanation of the format of the
to gain unauthorized privileges if they are able to replace the
the programs in which the pathname was found to determine whether
embedded references.
Code [embed003w]
The indicated pathname to an executable contains a component which
to gain unauthorized privileges if they are able to replace the
embedded references.
The indicated pathname to an executable contains a component which
embedded references.
embedded references.
embedded references.
to gain unauthorized privileges if they are able to replace the
to gain unauthorized privileges if they are able to replace the
embedded references.
to gain unauthorized privileges if they are able to replace the
to gain unauthorized privileges if they are able to replace the
The indicated pathname to an executable contains a component which
is group writable, world writable or both. This can enable an intruder
is group writable, world writable or both. This can enable an intruder
See the 'embed' explanation for an explanation of the format of the
The indicated pathname to an executable contains a component which
embedded references.
Code [embed003i]
Code [embed003w]
executable.
The indicated pathname to an executable contains a component which
there is a problem.
Code [embed003w]
The indicated pathname to an executable contains a component which
The indicated pathname to an executable contains a component which
The indicated pathname to an executable contains a component which
is group writable, world writable or both. This can enable an intruder
The indicated pathname to an executable contains a component which
See the 'embed' explanation for an explanation of the format of the
executable.
is group writable, world writable or both. This can enable an intruder
The indicated pathname to an executable contains a component which
The indicated pathname to an executable contains a component which
executable.
The indicated pathname to an executable contains a component which
The indicated pathname to an executable contains a component which
executable.
executable.
is group writable, world writable or both. This can enable an intruder
to gain unauthorized privileges if they are able to replace the
executable.
to gain unauthorized privileges if they are able to replace the
embedded references.
is group writable, world writable or both. This can enable an intruder
The indicated pathname to an executable contains a component which
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
is group writable, world writable or both. This can enable an intruder
The indicated pathname to an executable contains a component which
to gain unauthorized privileges if they are able to replace the
embedded references.
Code [embed003w]
is group writable, world writable or both. This can enable an intruder
Code [embed003i]
embedded references.
to gain unauthorized privileges if they are able to replace the
embedded references.
is group writable, world writable or both. This can enable an intruder
to gain unauthorized privileges if they are able to replace the
Code [embed003i]
to gain unauthorized privileges if they are able to replace the
to gain unauthorized privileges if they are able to replace the
is group writable, world writable or both. This can enable an intruder
executable.
to gain unauthorized privileges if they are able to replace the
to gain unauthorized privileges if they are able to replace the
to gain unauthorized privileges if they are able to replace the
is group writable, world writable or both. This can enable an intruder
is group writable, world writable or both. This can enable an intruder
Code [embed003i]
Code [embed003i]
executable.
to gain unauthorized privileges if they are able to replace the
executable.
Code [embed003i]
to gain unauthorized privileges if they are able to replace the
is group writable, world writable or both. This can enable an intruder
Code [embed003i]
is group writable, world writable or both. This can enable an intruder
executable.
executable.
to gain unauthorized privileges if they are able to replace the
See the 'embed' explanation for an explanation of the format of the
to gain unauthorized privileges if they are able to replace the
executable.
executable.
to gain unauthorized privileges if they are able to replace the
See the 'embed' explanation for an explanation of the format of the
executable.
Code [embed003i]
Code [embed003i]
to gain unauthorized privileges if they are able to replace the
embedded references.
The indicated pathname to a file or directory contains a component
Code [embed003i]
embedded references.
The indicated pathname to an executable contains a component which
Code [embed003i]
embedded references.
is group writable, world writable or both. This can enable an intruder
See the 'embed' explanation for an explanation of the format of the
Code [embed003i]
embedded references.
Code [embed003i]
Code [embed003i]
executable.
which is group writable, world writable or both. This may indicate a
to gain unauthorized privileges if they are able to replace the
Code [embed003i]
Code [embed003i]
See the 'embed' explanation for an explanation of the format of the
Code [embed003i]
Code [embed003i]
is group writable, world writable or both. This can enable an intruder
Code [embed003i]
to gain unauthorized privileges if they are able to replace the
Code [embed003i]
See the 'embed' explanation for an explanation of the format of the
embedded in pathname_3. Or, to read it the other way around,
binary pointed to by pathname_2, which in turn is a string
embedded in pathname_3. Or, to read it the other way around,
The embedded references are formatted as
embedded in pathname_3. Or, to read it the other way around,
binary pointed to by pathname_2, which in turn is a string
which indicates that pathname_1 is a string embedded in the
embedded references.
pathname_1->pathname_2->pathname_3...
pathname_3 refers to pathname_2 which refers to pathname_1.
embedded in pathname_3. Or, to read it the other way around,
embedded in pathname_3. Or, to read it the other way around,
embedded in pathname_3. Or, to read it the other way around,
pathname_3 refers to pathname_2 which refers to pathname_1.
pathname_3 refers to pathname_2 which refers to pathname_1.
pathname_3 refers to pathname_2 which refers to pathname_1.
embedded in pathname_3. Or, to read it the other way around,
pathname_3 refers to pathname_2 which refers to pathname_1.
See the 'embed' explanation for an explanation of the format of the
embedded in pathname_3. Or, to read it the other way around,
pathname_3 refers to pathname_2 which refers to pathname_1.
pathname_3 refers to pathname_2 which refers to pathname_1.
embedded in pathname_3. Or, to read it the other way around,
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
embedded references.
embedded references.
embedded references.
embedded in pathname_3. Or, to read it the other way around,
The indicated pathname to an executable contains a component which is not
which indicates that pathname_1 is a string embedded in the
embedded in pathname_3. Or, to read it the other way around,
which indicates that pathname_1 is a string embedded in the
binary pointed to by pathname_2, which in turn is a string
embedded in pathname_3. Or, to read it the other way around,
embedded references.
embedded references.
pathname_3 refers to pathname_2 which refers to pathname_1.
embedded references.
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
The indicated pathname to an executable contains a component which is not
if they are able to replace the binary. See the 'rationale' explanation
See the 'embed' explanation for an explanation of the format of the
embedded in pathname_3. Or, to read it the other way around,
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
embedded references.
See the 'embed' explanation for an explanation of the format of the
embedded in pathname_3. Or, to read it the other way around,
binary pointed to by pathname_2, which in turn is a string
if they are able to replace the binary. See the 'rationale' explanation
pathname_3 refers to pathname_2 which refers to pathname_1.
embedded references.
owned by root. This can enable an intruder to gain unauthorized privileges
The indicated pathname to an executable contains a component which is not
embedded references.
if they are able to replace the binary. See the 'rationale' explanation
owned by root. This can enable an intruder to gain unauthorized privileges
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
embedded references.
if they are able to replace the binary. See the 'rationale' explanation
for a discussion of the reasons that executables run by root should be
embedded references.
owned by root. This can enable an intruder to gain unauthorized privileges
if they are able to replace the binary. See the 'rationale' explanation
if they are able to replace the binary. See the 'rationale' explanation
owned by root. This can enable an intruder to gain unauthorized privileges
for a discussion of the reasons that executables run by root should be
for a discussion of the reasons that executables run by root should be
owned by root.
if they are able to replace the binary. See the 'rationale' explanation
if they are able to replace the binary. See the 'rationale' explanation
owned by root.
if they are able to replace the binary. See the 'rationale' explanation
for a discussion of the reasons that executables run by root should be
The indicated pathname to an executable contains a component which is not
for a discussion of the reasons that executables run by root should be
owned by root.
if they are able to replace the binary. See the 'rationale' explanation
for a discussion of the reasons that executables run by root should be
owned by root.
owned by root.
owned by root.
See the 'embed' explanation for an explanation of the format of the
for a discussion of the reasons that executables run by root should be
for a discussion of the reasons that executables run by root should be
for a discussion of the reasons that executables run by root should be
for a discussion of the reasons that executables run by root should be
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
owned by root.
embedded references.
embedded references.
for a discussion of the reasons that executables run by root should be
owned by root. This can enable an intruder to gain unauthorized privileges
owned by root.
The indicated pathname to an executable contains a component which is not
The indicated pathname to a file or directory contains a component which
owned by root. This can enable an intruder to gain unauthorized privileges
if they are able to replace the binary. See the 'rationale' explanation
owned by root.
for a discussion of the reasons that executables run by root should be
owned by root.
embedded references.
if they are able to replace the binary. See the 'rationale' explanation
owned by root.
embedded references.
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
embedded references.
for a discussion of the reasons that executables run by root should be
See the 'embed' explanation for an explanation of the format of the
The indicated pathname to a file or directory contains a component which
The indicated pathname to a file or directory contains a component which
See the 'embed' explanation for an explanation of the format of the
embedded references.
embedded references.
The indicated pathname to a file or directory contains a component which
It will be necessary to study the programs in which the pathname was
is not owned by root. This may indicate a vulnerability in the system.
See the 'embed' explanation for an explanation of the format of the
The indicated pathname to a file or directory contains a component which
owned by root.
The indicated pathname to a file or directory contains a component which
The indicated pathname to a file or directory contains a component which
embedded references.
is not owned by root. This may indicate a vulnerability in the system.
The indicated pathname to a file or directory contains a component which
It will be necessary to study the programs in which the pathname was
is not owned by root. This may indicate a vulnerability in the system.
embedded references.
It will be necessary to study the programs in which the pathname was
The indicated pathname to a file or directory contains a component which
embedded references.
The indicated pathname to a file or directory contains a component which
embedded references.
See the 'embed' explanation for an explanation of the format of the
is not owned by root. This may indicate a vulnerability in the system.
It will be necessary to study the programs in which the pathname was
See the 'embed' explanation for an explanation of the format of the
It will be necessary to study the programs in which the pathname was
See the 'embed' explanation for an explanation of the format of the
The indicated pathname to a file or directory contains a component which
found to determine whether there is a problem.
It will be necessary to study the programs in which the pathname was
embedded references.
It will be necessary to study the programs in which the pathname was
found to determine whether there is a problem.
embedded references.
embedded references.
found to determine whether there is a problem.
It will be necessary to study the programs in which the pathname was
The indicated pathname to a file or directory contains a component which
The indicated pathname to a file or directory contains a component which
found to determine whether there is a problem.
The indicated executable is not owned by owned by root. This can
is not owned by root. This may indicate a vulnerability in the system.
It will be necessary to study the programs in which the pathname was
found to determine whether there is a problem.
is not owned by root. This may indicate a vulnerability in the system.
found to determine whether there is a problem.
See the 'embed' explanation for an explanation of the format of the
found to determine whether there is a problem.
embedded references.
found to determine whether there is a problem.
is not owned by root. This may indicate a vulnerability in the system.
is not owned by root. This may indicate a vulnerability in the system.
See the 'embed' explanation for an explanation of the format of the
embedded references.
It will be necessary to study the programs in which the pathname was
The indicated pathname to a file or directory contains a component which
The indicated executable is not owned by owned by root. This can
It will be necessary to study the programs in which the pathname was
embedded references.
embedded references.
embedded references.
enable an intruder to gain unauthorized privileges if they are able to
See the 'embed' explanation for an explanation of the format of the
embedded references.
enable an intruder to gain unauthorized privileges if they are able to
The indicated executable is not owned by owned by root. This can
The indicated executable is not owned by owned by root. This can
enable an intruder to gain unauthorized privileges if they are able to
discussion of the reasons that executables run by root should be owned
by root.
See the 'embed' explanation for an explanation of the format of the
discussion of the reasons that executables run by root should be owned
The indicated executable is not owned by owned by root. This can
Note that if the executable is setuid to a non-root ID, then the
embedded references.
by root.
ownershop should *NOT* be changed to root unless the setuid bit
discussion of the reasons that executables run by root should be owned
discussion of the reasons that executables run by root should be owned
by root.
by root.
by root.
by root.
Note that if the executable is setuid to a non-root ID, then the
discussion of the reasons that executables run by root should be owned
Note that if the executable is setuid to a non-root ID, then the
Note that if the executable is setuid to a non-root ID, then the
ownershop should *NOT* be changed to root unless the setuid bit
enable an intruder to gain unauthorized privileges if they are able to
discussion of the reasons that executables run by root should be owned
ownershop should *NOT* be changed to root unless the setuid bit
ownershop should *NOT* be changed to root unless the setuid bit
Note that if the executable is setuid to a non-root ID, then the
by root.
embedded references.
discussion of the reasons that executables run by root should be owned
ownershop should *NOT* be changed to root unless the setuid bit
ownershop should *NOT* be changed to root unless the setuid bit
Note that if the executable is setuid to a non-root ID, then the
by root.
ownershop should *NOT* be changed to root unless the setuid bit
is also removed.
See the 'embed' explanation for an explanation of the format of the
is also removed.
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
ownershop should *NOT* be changed to root unless the setuid bit
discussion of the reasons that executables run by root should be owned
Note that if the executable is setuid to a non-root ID, then the
ownershop should *NOT* be changed to root unless the setuid bit
embedded references.
is also removed.
is also removed.
Note that if the executable is setuid to a non-root ID, then the
embedded references.
embedded references.
See the 'embed' explanation for an explanation of the format of the
embedded references.
ownershop should *NOT* be changed to root unless the setuid bit
indicate a vulnerability in the system. It will be necessary to study
Note that if the executable is setuid to a non-root ID, then the
See the 'embed' explanation for an explanation of the format of the
ownershop should *NOT* be changed to root unless the setuid bit
ownershop should *NOT* be changed to root unless the setuid bit
the programs in which the pathname was found to determine whether
is also removed.
ownershop should *NOT* be changed to root unless the setuid bit
See the 'embed' explanation for an explanation of the format of the
The indicated file or directory is not owned by root. This may
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
The indicated file or directory is not owned by root. This may
embedded references.
embedded references.
is also removed.
embedded references.
embedded references.
indicate a vulnerability in the system. It will be necessary to study
See the 'embed' explanation for an explanation of the format of the
embedded references.
embedded references.
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
indicate a vulnerability in the system. It will be necessary to study
See the 'embed' explanation for an explanation of the format of the
the programs in which the pathname was found to determine whether
indicate a vulnerability in the system. It will be necessary to study
See the 'embed' explanation for an explanation of the format of the
indicate a vulnerability in the system. It will be necessary to study
indicate a vulnerability in the system. It will be necessary to study
indicate a vulnerability in the system. It will be necessary to study
embedded references.
The indicated file or directory is not owned by root. This may
indicate a vulnerability in the system. It will be necessary to study
indicate a vulnerability in the system. It will be necessary to study
indicate a vulnerability in the system. It will be necessary to study
The indicated file or directory is not owned by root. This may
the programs in which the pathname was found to determine whether
The indicated file or directory is not owned by root. This may
The indicated file or directory is not owned by root. This may
the programs in which the pathname was found to determine whether
indicate a vulnerability in the system. It will be necessary to study
The indicated file or directory is not owned by root. This may
indicate a vulnerability in the system. It will be necessary to study
there is a problem.
The indicated file or directory is not owned by root. This may
the programs in which the pathname was found to determine whether
indicate a vulnerability in the system. It will be necessary to study
indicate a vulnerability in the system. It will be necessary to study
the programs in which the pathname was found to determine whether
there is a problem.
there is a problem.
The indicated file or directory is not owned by root. This may
there is a problem.
the programs in which the pathname was found to determine whether
the programs in which the pathname was found to determine whether
See the 'embed' explanation for an explanation of the format of the
there is a problem.
the programs in which the pathname was found to determine whether
there is a problem.
See the 'embed' explanation for an explanation of the format of the
the programs in which the pathname was found to determine whether
the programs in which the pathname was found to determine whether
See the 'embed' explanation for an explanation of the format of the
there is a problem.
embedded references.
embedded references.
the programs in which the pathname was found to determine whether
indicate a vulnerability in the system. It will be necessary to study
The indicated pathname to an executable contains a component which
The indicated file or directory is not owned by root. This may
The indicated file or directory is not owned by root. This may
embedded references.
indicate a vulnerability in the system. It will be necessary to study
there is a problem.
embedded references.
See the 'embed' explanation for an explanation of the format of the
there is a problem.
embedded references.
there is a problem.
there is a problem.
embedded references.
the programs in which the pathname was found to determine whether
indicate a vulnerability in the system. It will be necessary to study
is group writable, world writable or both. This can enable an intruder
indicate a vulnerability in the system. It will be necessary to study
there is a problem.
See the 'embed' explanation for an explanation of the format of the
embedded references.
See the 'embed' explanation for an explanation of the format of the
embedded references.
there is a problem.
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
is group writable, world writable or both. This can enable an intruder
embedded references.
there is a problem.
embedded references.
embedded references.
See the 'embed' explanation for an explanation of the format of the
See the 'embed' explanation for an explanation of the format of the
The indicated pathname to an executable contains a component which
is group writable, world writable or both. This can enable an intruder
is group writable, world writable or both. This can enable an intruder
is group writable, world writable or both. This can enable an intruder
embedded references.
is group writable, world writable or both. This can enable an intruder
to gain unauthorized privileges if they are able to replace the
The indicated pathname to an executable contains a component which
is group writable, world writable or both. This can enable an intruder
The indicated pathname to an executable contains a component which
is group writable, world writable or both. This can enable an intruder
to gain unauthorized privileges if they are able to replace the
The indicated pathname to an executable contains a component which
The indicated pathname to an executable contains a component which
is group writable, world writable or both. This can enable an intruder
to gain unauthorized privileges if they are able to replace the
is group writable, world writable or both. This can enable an intruder
executable.
The indicated pathname to an executable contains a component which
executable.
is group writable, world writable or both. This can enable an intruder
The indicated pathname to an executable contains a component which
See the 'embed' explanation for an explanation of the format of the
executable.
executable.
See the 'embed' explanation for an explanation of the format of the
to gain unauthorized privileges if they are able to replace the
to gain unauthorized privileges if they are able to replace the
See the 'embed' explanation for an explanation of the format of the
The indicated pathname to an executable contains a component which
executable.
executable.
See the 'embed' explanation for an explanation of the format of the
executable.
See the 'embed' explanation for an explanation of the format of the
to gain unauthorized privileges if they are able to replace the
to gain unauthorized privileges if they are able to replace the
is group writable, world writable or both. This can enable an intruder
embedded references.
executable.
executable.
The indicated pathname to an executable contains a component which
executable.
executable.
executable.
embedded references.
executable.
See the 'embed' explanation for an explanation of the format of the
embedded references.
executable.
is group writable, world writable or both. This can enable an intruder