diff options
author | ru <ru@FreeBSD.org> | 2002-01-15 14:11:05 +0000 |
---|---|---|
committer | ru <ru@FreeBSD.org> | 2002-01-15 14:11:05 +0000 |
commit | 2aa7f13a7d0162ad396a95251dceae601862f622 (patch) | |
tree | d8f87c866c4947f8938b35454d7ce942d7c4658e /lib/libc/string/wcscspn.c | |
parent | 99ceec2679852c284a07d9db09b0831db7c86abb (diff) | |
download | FreeBSD-src-2aa7f13a7d0162ad396a95251dceae601862f622.zip FreeBSD-src-2aa7f13a7d0162ad396a95251dceae601862f622.tar.gz |
Do not install man(1) setuid ``man''.
The catpaging and setuidness features of man(1) combined make
it vulnerable to a number of security attacks. Specifically,
it was possible to overwrite system catpages with arbitrarily
contents by either setting up a symlink to a directory holding
system catpages, or by writing custom -mdoc or -man groff(1)
macro packages and setting up GROFF_TMAC_PATH in environment
to point to them. (See PR below for details).
This means man(1) can no longer create system catpages on a
regular user's behalf. (It is still able to if the user has
write permissions to the directory holding catpages, e.g.,
user's own manpages, or if the running user is ``root''.)
To create and install catpages during ``make world'', please
set MANBUILDCAT=YES in /etc/make.conf. To rebuild catpages
on a weekly basis, please set weekly_catman_enable="YES" in
/etc/periodic.conf.
PR: bin/32791
Diffstat (limited to 'lib/libc/string/wcscspn.c')
0 files changed, 0 insertions, 0 deletions