From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id C7C8D1382C5 for ; Sun, 6 Dec 2020 16:57:31 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id F36DCE097C; Sun, 6 Dec 2020 16:57:26 +0000 (UTC) Received: from ciao.gmane.io (static.214.254.202.116.clients.your-server.de [116.202.254.214]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id A40AAE096B for ; Sun, 6 Dec 2020 16:57:26 +0000 (UTC) Received: from list by ciao.gmane.io with local (Exim 4.92) (envelope-from ) id 1klxLh-0006bp-AF for gentoo-user@lists.gentoo.org; Sun, 06 Dec 2020 17:57:25 +0100 X-Injected-Via-Gmane: http://gmane.org/ To: gentoo-user@lists.gentoo.org From: Martin Vaeth Subject: [gentoo-user] Re: Switching default tmpfiles and faster internet coming my way. Date: Sun, 6 Dec 2020 16:57:21 -0000 (UTC) Message-ID: References: <88428daf-071f-d032-0e87-017528cd7a18@gentoo.org> User-Agent: slrn/1.0.3 (Linux) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply X-Archives-Salt: b6b8f4da-e336-4b29-b6bb-825ed2459447 X-Archives-Hash: 40913e8045093b7bd3de47a9b9d91d94 Michael Orlitzky wrote: > > Why are you focusing on /tmp and /var/tmp? Because only world-writable directories are the ones which can be exploited unless the tmpfiles.conf author does something malevolent or extremely stupid. > To pick a relevant example relevant? > If that was a 'Z' entry, or if it created another portage:portage > directory beneath /var/cache/eix In other words: If the completely harmless example would have been replaced by an intentionally malevolent one, this could do harm. With this logic, installing systemd-opentmpfiles is the same security risk: If its ebuild would just contain the line chmod -R /* everybody could easily become root on your system when you install it.