oss-sec mailing list archives

Re: Fwd: Bug script install slackware


From: "Patrick J. Volkerding" <security () slackware com>
Date: Tue, 29 Nov 2011 08:09:16 -0600

Hello,

While I'm sure there are a number of bugs in the crufty old installer scripts, I'll need to know how there's a security impact before notifying everyone that the sky has fallen. I'd also like to note that if running the installer requires physical access to the machine I'm liable to consider security to already be non-existent at that time.

Please clarify what is wrong with examples of how to reproduce the issue, and I'll look into it.

Thanks.

On 11/28/2011 05:18 PM, Raphael Bastos wrote:
---------- Forwarded message ----------
From: Raphael Bastos<tecnologia () bastosservice com br>
Date: 2011/10/28
Subject: Bug script install slackware
To: volkerdi () slackware com


Take a look.... this is the correction sugest to script "SeTpartitions".

EX: sed ,'/mnt','$T_PX',g --- on lines 374, 495, 496, 503.

livecd setup # cat -n  SeTpartitions |grep T_PX
   10  T_PX=/mnt
  374  mount $ROOT_DEVICE $T_PX -t $ROOT_SYS_TYPE 1>  $REDIR 2>  $REDIR
  495        if [ ! -d $T_PX/$MTPT ]; then
  496           mkdir -p $T_PX/$MTPT
  503        mount $NEXT_PARTITION $T_PX/$MTPT -t $NEXT_SYS_TYPE 1>
$REDIR 2>  $REDIR


Att,
Raphael Bastos aka chemonz

===============================================
Bastos Service Manutenção Industrial Ltda.
www.bastosservice.com.br
Linux Reg. User: 388431  //  LPI ID: LPI000214711
email:~>  $ echo "vgepqnqikcBdcuvquugtxkeg0eqo0dt" | perl -pe \
's/(.)/chr(ord($1)-2)/ge'
===============================================


Current thread: