"Olson, Arthur David (NIH/NCI)" <olsona at dc37a.nci.nih.gov> writes: > Is there anything that could be done by a carefully selected TZ > value that can't be done more easily in other ways? Yes, I'd say so. Generally, it's attacking setuid programs that rely on TZ to do something reasonable, e.g., when appending time stamps to log files.