1 |
On Thu, 2004-09-30 at 15:21, Stephen P. Becker wrote: |
2 |
> > Remember, it's not just security though. A bug in a script when run |
3 |
> > as root could wipe out all or parts of a system. |
4 |
> > |
5 |
> |
6 |
> ...which is the reason why we have sandbox. FEATURES="sandbox" causes |
7 |
> an emerge to terminate immediately with an access violation if it |
8 |
> attempts to touch system files before the build is complete. |
9 |
> |
10 |
> I'm not saying you are wrong by the way, I'm just pointing out that |
11 |
> stuff like this has been thought of before, so portage has safety nets |
12 |
> accordingly. |
13 |
|
14 |
And sandbox does such a good job. |
15 |
|
16 |
cd /usr/lib/portage/bin/ && HOME=`perl -e 'print "A"x512'` && ./sandbox |
17 |
========================== Gentoo linux path sandbox |
18 |
=========================== |
19 |
Detection of the support files. |
20 |
Verification of the required files. |
21 |
Setting up the required environment variables. |
22 |
sandbox: stack smashing attack in function setenv_sandbox_write() |
23 |
Aborted |
24 |
|
25 |
> |
26 |
> Steve |
27 |
> |
28 |
> |
29 |
> |
30 |
> -- |
31 |
> gentoo-dev@g.o mailing list |
32 |
-- |
33 |
Ned Ludd <solar@g.o> |
34 |
Gentoo (hardened,security,infrastructure,embedded,toolchain) Developer |