Hello Mark,
On Thu, 2010-12-16 at 16:21 -0500, m.roth@5-cent.us wrote:
One possibility: suppose someone cracks in as the user that owns those directories. They could then install whatever they want in there... and the next time you built and installed something, it could carry their payload.
How would that be more of an issue using /usr/src/redhat than any other directory?
And seeing that most builds start with either installing a srpm or building directly in which case that srpm is also being freshly installed how is this enabling an attacker to deliver a payload?
Regards, Leonard.