On 07/28/2011 12:54 PM, Bernd Stramm wrote:
> On Thu, 28 Jul 2011 11:24:48 +0100
> "Bryn M. Reeves" <b...@redhat.com> wrote:
>> There are already quite a few things that may place executables
>> under . prefixed paths in home. Java web start (javaws) for instance
>> will install an entire jre under .java/deployment/cache, wine has for
>> many years installed Windows executables (that can be executed by the
>> system) under .wine, browser plugins may be installed
>> to .mozilla/plugins and are just as capable of performing "evil"
>> actions as an executable (e.g. drop a malicious plugin that hijacks
>> some common MIME types, do your $evil and then wrap the intended
>> plugin).
>>
>> There are various other examples - on an older release I find 171
>> such files under ~/:
>>
>> $ find $(l. | egrep -v '\.$|\.\.$') -type f -perm /111 | wc -l
>> 171
> 
> This is no excuse to add to a bad habit.

I'm not using it as an excuse for anything but I do think it is evidence that
the security implications being bandied around in this thread are rather
overblown; as others have said an attacker that can write to these locations is
/already/ a problem.

Using ~/.local (or any other path in home) doesn't make that any better or 
worse.

Regards,
Bryn.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Reply via email to