[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#316154: texmf.cfg: Close possible security problem



On 29.06.05 Richard Lewis (rtf@jabble.com) wrote:
> Joachim Breitner <nomeata@debian.org> writes:

Hi,

> > the shipped /etc/texmf/texmf.cfg has the following lines:
> >
> > openout_any = p
> > openin_any = a
> >
> > While the first line is so far ok, the second line means, that
> > any LaTeX code run on this machine has read-access like the user
> > it runs as, that includes /etc/passwd, ~/.ssh/id_rsa,
> > ~/other_sensitive_file.
> 
> > Changeing the line to
> > openin_any = p
> > solves this problem.
> 
> You could use openin_any = r which just disallows opening dotfiles.
> But in any case I think this is a social problem rather than a
> software problem (you could just as easily send the user a shell
> script for them to run and send you the output (which could be
> encrypted or a postscript file as in the original example), as cat
> will happily access any file you can read, but i dont see people
> calling cat insecure!)
> 
Well, calling any unchecked code with Admin permissions is insecure.
Joachim, based on this statement, do you agree that this is not
really a bug, but rather wishlist or can even be closed? Anybody
needing more security than the normal texmf.cnf provides can change
that file himself.

Regards,
  Hilmar
-- 
The college graduate is presented with a sheepskin to cover his
intellectual nakedness.
		-- Robert M. Hutchins
  http://hilmarpreusse.forum-rheinland.de/



Reply to: