summaryrefslogtreecommitdiff
path: root/sysutils
diff options
context:
space:
mode:
authorKris Kennaway <kris@FreeBSD.org>1999-02-23 11:21:09 +0000
committerKris Kennaway <kris@FreeBSD.org>1999-02-23 11:21:09 +0000
commit2f1ad59ee3fd624324b1ffa1e1f812fd081946d2 (patch)
tree22f907f698ce15c7681d97d6c498c2c75ed5536f /sysutils
parentRemove qt-1.41, we've all shifted to qt-1.42 now. (diff)
The wmmon port likes to install itself setuid root. Unfortunately, it has a
major security hole (and at least one minor one) resulting in a local root exploit. Until a better fix is available, this patch installs the binary chmod go-s, meaning you must be root to run it. If anyone is using this in a multi-user environment they are strongly advised to remove the setuid bit. Submitted by: Steve Reid <sreid@alpha.sea-to-sky.net>
Notes
Notes: svn path=/head/; revision=16873
Diffstat (limited to 'sysutils')
-rw-r--r--sysutils/wmmon/Makefile6
-rw-r--r--sysutils/wmmon/pkg-descr4
2 files changed, 7 insertions, 3 deletions
diff --git a/sysutils/wmmon/Makefile b/sysutils/wmmon/Makefile
index c32818d1799b..6f738752beb3 100644
--- a/sysutils/wmmon/Makefile
+++ b/sysutils/wmmon/Makefile
@@ -3,7 +3,7 @@
# Date created: 27 November 1998
# Whom: Kris Kennaway <kkennawa@physics.adelaide.edu.au>
#
-# $Id: Makefile,v 1.4 1999/01/18 06:43:01 asami Exp $
+# $Id: Makefile,v 1.5 1999/01/26 19:53:01 fenner Exp $
#
DISTNAME= wmmon-1.0b2
@@ -35,8 +35,8 @@ post-patch:
@${CP} ${WRKDIR}/wmmon/Makefile.FreeBSD-2.2 ${WRKSRC}/Makefile
.endif
-post-install:
- @strip ${PREFIX}/bin/wmmon
+do-install:
+ ${INSTALL_PROGRAM} ${WRKSRC}/wmmon ${PREFIX}/bin/wmmon
.if !defined(NOPORTDOCS)
${MKDIR} ${PREFIX}/share/doc/wmmon
diff --git a/sysutils/wmmon/pkg-descr b/sysutils/wmmon/pkg-descr
index 9d11bcd0606f..99c5225ab9f7 100644
--- a/sysutils/wmmon/pkg-descr
+++ b/sysutils/wmmon/pkg-descr
@@ -15,3 +15,7 @@ WMMon currently provides:
* Can be started multiple times;
* Commandline options for help (-h), version (-v),
start mode (-i & -s) and display (-d);
+
+** NOTE - a trivial root exploit was discovered in the current version. As
+ a result, we no longer install the binary setuid root - meaning it
+ cannot be run by arbitrary users.