This is the mail archive of the
glibc-bugs@sourceware.org
mailing list for the glibc project.
[Bug libc/12393] ld.so: insecure handling of privileged programs' RPATHs with $ORIGIN
- From: "pasky at suse dot cz" <sourceware-bugzilla at sourceware dot org>
- To: glibc-bugs at sources dot redhat dot com
- Date: Sat, 16 Apr 2011 00:43:27 +0000
- Subject: [Bug libc/12393] ld.so: insecure handling of privileged programs' RPATHs with $ORIGIN
- Auto-submitted: auto-generated
- References: <bug-12393-131@http.sourceware.org/bugzilla/>
http://sourceware.org/bugzilla/show_bug.cgi?id=12393
Petr Baudis <pasky at suse dot cz> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |pasky at suse dot cz
--- Comment #2 from Petr Baudis <pasky at suse dot cz> 2011-04-16 00:41:46 UTC ---
The initial comment is highly confusing, since when it says "ld.so currently
expands $ORIGIN..." it talks NOT about master, but just about the fedora/
branches! In master, $ORIGIN is still expanded even for setuid programs, making
just the hardlink attack possible in case someone is foolish enough to compile
their setuid program with rpath $ORIGIN.
Therefore, the bug pretty much just describes which changes need to be covered
when restricting $ORIGIN usage in setuid programs in master. An additional
Ulrich's requirement is to whitelist system directories as $ORIGIN values even
in setuid programs.
--
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.