This is the mail archive of the glibc-bugs@sourceware.org mailing list for the glibc project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug libc/12393] ld.so: insecure handling of privileged programs' RPATHs with $ORIGIN


http://sourceware.org/bugzilla/show_bug.cgi?id=12393

Petr Baudis <pasky at suse dot cz> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |pasky at suse dot cz

--- Comment #2 from Petr Baudis <pasky at suse dot cz> 2011-04-16 00:41:46 UTC ---
The initial comment is highly confusing, since when it says "ld.so currently
expands $ORIGIN..." it talks NOT about master, but just about the fedora/
branches! In master, $ORIGIN is still expanded even for setuid programs, making
just the hardlink attack possible in case someone is foolish enough to compile
their setuid program with rpath $ORIGIN.

Therefore, the bug pretty much just describes which changes need to be covered
when restricting $ORIGIN usage in setuid programs in master. An additional
Ulrich's requirement is to whitelist system directories as $ORIGIN values even
in setuid programs.

-- 
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]