1 |
Am Sonntag, 9. Dezember 2018, 16:46:39 CET schrieb Philip Webb: |
2 |
> 181209 Marc Joliet wrote: |
3 |
> > Am Sonntag, 9. Dezember 2018, 11:35:16 CET schrieb Philip Webb: |
4 |
> >> What exactly are the "security reasons" ? |
5 |
> >> Do they apply to a single-user system ? -- if not, |
6 |
> >> why is the restrictive version of the policy file installed by default |
7 |
> >> rather than a warning at the end of the emerge output ? |
8 |
> > |
9 |
> > Good question. Checking the git log, the change was mode over two |
10 |
> > commits: |
11 |
> > https://gitweb.gentoo.org/repo/gentoo.git/commit/? |
12 |
> > id=02765dfc333e578af9e3fd525fc0067dc47d6528 |
13 |
> > https://gitweb.gentoo.org/repo/gentoo.git/commit/? |
14 |
> > id=df7afbda6b12a68578833225e694cee011b20342 |
15 |
> > The commit messages point to https://www.kb.cert.org/vuls/id/332928/ |
16 |
> > and https://bugs.gentoo.org/664236, |
17 |
> > which basically explain in more detail what Mick summarized yesterday. |
18 |
> |
19 |
> It looks to me like an over-reaction to a fairly unlikely exploit. |
20 |
> You are protected if you don't download images from untrusted sites |
21 |
> or if you don't run Ghostscript as root (who would ? ). |
22 |
|
23 |
A remote code execution vulnerability is problematic even when "merely" |
24 |
executed as your own user. I don't understand why you would think that it |
25 |
only matters when run as root. |
26 |
|
27 |
-- |
28 |
Marc Joliet |
29 |
-- |
30 |
"People who think they know everything really annoy those of us who know we |
31 |
don't" - Bjarne Stroustrup |