Subject: Re: Installing local packages and NetBSD guide
To: None <netbsd-users@NetBSD.org>
From: John Nemeth <jnemeth@victoria.tc.ca>
List: netbsd-users
Date: 09/28/2007 18:13:26
On Jan 14, 8:13am, Magnus Eriksson wrote:
} On Fri, 28 Sep 2007, John Nemeth wrote:
}
} > } Having a suid root program exploited to create the directory, or change
} > } the permissions of it -- *that* security problem.
}
} > If an suid root program can be exploited in such a way, it can
} > most likely cause all sorts of other problems.
}
} Maybe such a buggy program could, maybe not. But are you then saying
} that this particular hole should therefore *not* be fixed?
}
} Seems kinda obvious to me that when you see a potential security
} problem, you fix it right away, no matter how unlikely it seems it might
} be exploited. That just the way you do things.
Sure, but I think this is just being paranoid. Only root can
setup those directories. If anything else manages to do so, then
you're already screwed.
} > } I don't know exactly in which "various default PATHs" /usr/local is
} >
} > The ones in /etc/skel/*, which are the files used to populate a
} > user's home directory when you do 'useradd -m ...'. Also, the ones in
} > /root/.*.
}
} So in the default PATH for all users? Including root? Wow.
Yes. See src/etc/{root,skel}/dot.{cshrc,profile}.
/usr/local/{,s}bin is at end of the path.
}-- End of excerpt from Magnus Eriksson