> >
> >
> >>I'm using a LFS 5.1.1 with cracklib + pam + shadow. I have recently
> upgraded
> >>PAM (0.80) and shadow (4.0.10) and cracklib according to the BLFS dev
> book
> >>and have a problem with su and PATH variable.
> >
> >
> > This issue was recently discovered and a bug has already been entered
> > into the bug tracking system. Currently, there is no known solution
> > other than to use su -.
> >
> 
> As the bug report shows, add
> 'PATH DEFAULT=/usr/local/bin:/usr/bin:/bin:... OVERIDE=${PATH}' to
> /etc/security/pam_env.conf to create a valid user path.  For a default
> root (superuser) path, create a valid /root/.bashrc that contains the
> overidden path desired.
> 

I think there is a case where this won't work. The one of root doing su to
become a user.

[EMAIL PROTECTED] ~]
 1$ echo $PATH
/bin:/usr/bin:/usr/local/bin    <= user PATH is OK.
[EMAIL PROTECTED] ~]
 2$ su -
Password:
[EMAIL PROTECTED] ~]
 1# echo $PATH          <= ROOT PATH is ok (.bashrc..)
/bin:/usr/bin:/sbin:/usr/sbin:/usr/local/bin:/usr/local/sbin
[EMAIL PROTECTED] ~]
 2# su user
[EMAIL PROTECTED]:/root$ echo $PATH
/usr/gnu/bin:/usr/local/bin:/usr/ucb:/bin:/usr/bin:.    <= user bad PATH
(bash default)
[EMAIL PROTECTED]:/root$

Emmanuel.

-- 
http://linuxfromscratch.org/mailman/listinfo/blfs-dev
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to