Hello Mark,

On Thu, 2010-12-16 at 16:21 -0500, m.r...@5-cent.us wrote:
> One possibility: suppose someone cracks in as the user that owns those
> directories. They could then install whatever they want in there... and
> the next time you built and installed something, it could carry their
> payload.

How would that be more of an issue using /usr/src/redhat than any other
directory?

And seeing that most builds start with either installing a srpm or
building directly in which case that srpm is also being freshly
installed how is this enabling an attacker to deliver a payload?

Regards,
Leonard.

-- 
mount -t life -o ro /dev/dna /genetic/research


_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to