Bug 114616 - insecure PATH variable set by login as root
Summary: insecure PATH variable set by login as root
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat Enterprise Linux 3
Classification: Red Hat
Component: util-linux
Version: 3.0
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Elliot Lee
QA Contact: Ben Levenson
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2004-01-30 07:57 UTC by Thilo Müller
Modified: 2007-11-30 22:07 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2004-02-24 15:54:25 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Thilo Müller 2004-01-30 07:57:18 UTC
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; de-AT; rv:1.4) Gecko/20030922

Description of problem:
When logging in as root the /usr/local directories are inserted in the
PATH variable before /usr/sbin /sbin /usr/bin /bin


Version-Release number of selected component (if applicable):


How reproducible:
Always

Steps to Reproduce:
1.Login as root
2.echo $PATH


    

Actual Results: 
/usr/kerberos/sbin:/usr/kerberos/bin:/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin:/usr/X11R6/bin:/root/bin


Expected Results: 
3./usr/kerberos/sbin:/usr/kerberos/bin:/sbin:/bin:/usr/sbin:/usr/bin:/usr/X11R6/bin:/root/bin:/usr/local/sbin:/usr/local/bin

The /usr/local directories should be used last in the PATH variable

Additional info:

Comment 1 Elliot Lee 2004-02-24 15:54:25 UTC
Typically /usr/local/*bin are placed ahead in the path to allow local
overrides of programs that come with the OS.

Because only root can write to /usr/local/* on a default install, this
doesn't pose a security risk.


Note You need to log in before you can comment on or make changes to this bug.