|
From: | GNU bug Tracking System |
Subject: | [debbugs-tracker] bug#10498: closed (New patch fo r rm. Jesús Hernández Gormaz.) |
Date: | Sat, 14 Jan 2012 03:28:01 +0000 |
Your message dated Sat, 14 Jan 2012 03:26:46 +0000 with message-id <address@hidden> and subject line Re: bug#10498: New patch for rm. Jesús Hernández Gormaz. has caused the debbugs.gnu.org bug report #10498, regarding New patch for rm. Jesús Hernández Gormaz. to be marked as done. (If you believe you have received this mail in error, please contact address@hidden) -- 10498: http://debbugs.gnu.org/cgi/bugreport.cgi?bug=10498 GNU Bug Tracking System Contact address@hidden with problems
--- Begin Message ---Subject: New patch for rm. Jesús Hernández Gormaz. Hello, I am Jesús Hernández Gormaz. Date: Sat, 14 Jan 2012 02:35:53 +0000
The attachment DIFF is the patch obtained (as indicated in the HACKING file)
with the command:
git format-patch --stdout -1 > DIFF
Rm program using the - no-preserve-root to delete the entire root directory
recursively, without prompting. This makes it possible to hide the command
between the lines of a script that appears to have a useful function and need
root permissions, eliminating the user's system without the knowledge of this.
In script_of_deception.sh can see an example, very simple and not realistic to
serve only as an example of how you could trick the user (CAUTION: DO NOT
RUN without a rm has already applied my patch).
Tabi included some screenshots of rm with my changes in operation, both running
rm-fr - no-preserve-root / script_of_deception.sh running manually and in both
cases preventing the removal of the operating system without explicit user
confirmation.
The idea that this would be a nice change arose from the cycle classes of
microcomputer systems and networks, studying the scripts of GNU / Linux in
one of the practices planning to run an rm to delete the entire root directory,
and the teacher was with superuser permissions for scripts you need. In a few
seconds, and without prompting, the system was completely erased. Asking the
user for confirmation nasty accidents can be avoided by running a script that
someone wrote in a malicious way.
--
JHG.
DIFF
Description: Binary datascript_of_deception.sh
Description: Bourne shell scriptrm-0.png
Description: PNG imagerm-1.png
Description: PNG imagerm-2.png
Description: PNG image
--- End Message ---
--- Begin Message ---Subject: Re: bug#10498: New patch for rm. Jesús Hernánde z Gormaz. Date: Sat, 14 Jan 2012 03:26:46 +0000 User-agent: Mozilla/5.0 (X11; Linux x86_64; rv:6.0) Gecko/20110816 Thunderbird/6.0 tags 10498 notabug On 01/14/2012 02:35 AM, Jesús Hernández Gormaz wrote: > Hello, I am Jesús Hernández Gormaz. > > The attachment DIFF is the patch obtained (as indicated in the HACKING file) > with the command: > git format-patch --stdout -1 > DIFF Thanks for taking the time to do a patch. Unfortunately I don't think this mechanism is practical. One could always put this in a script: eval $(echo ZWNobyB5IHwgZXZpbF9pbnRlcmFjdGl2ZV9jb21tYW5kCg== | base64 -d) which would be equivalent to running: echo y | evil_interactive_command For many reasons the root user must be 100% sure of all logic they're running. cheers, Pádraig.
--- End Message ---
[Prev in Thread] | Current Thread | [Next in Thread] |