Multiple libraries privilege checking (PATCH for RPM e popt from open wall)

Registered by devzero2000

On the oss-security mailing list Sebastian Krahmer wrote :
"Hi,

Its probably about time to review libraries that are commonly
linked to (formerly-) suid programs, such as
libldap, libssl etc. In near future, in the advent of file caps
they are often lacking proper checks.
They usually just compare uid against euid (not even gid sometimes)
and do not check the dumpable flag or AT_SECURE (dont know whether
glibc exports a proper function to easily check that at all).
"
(look here for the complete post : http://article.gmane.org/gmane.comp.security.oss.general/5061)

and Solar Designer of the project Openwall answered :
"> Its probably about time to review libraries that are commonly
> linked to (formerly-) suid programs, such as
> libldap, libssl etc. In near future, in the advent of file caps
> they are often lacking proper checks.

Good idea.

> They usually just compare uid against euid (not even gid sometimes)
> and do not check the dumpable flag or AT_SECURE (dont know whether
> glibc exports a proper function to easily check that at all).

glibc exports the __libc_enable_secure variable, which is initialized
based on AT_* including AT_SECURE. It also exports __secure_getenv().
"
(look here for the complete post http://article.gmane.org/gmane.comp.security.oss.general/5066).

So i think is not so bad to review the path posted above and integrate it if applicable in popt 1.17DEVEL HEAD

Blueprint information

Status:
Complete
Approver:
devzero2000
Priority:
Low
Drafter:
devzero2000
Direction:
Approved
Assignee:
devzero2000
Definition:
Superseded
Series goal:
None
Implementation:
Blocked
Milestone target:
milestone icon 1.17
Started by
devzero2000
Completed by
devzero2000

Related branches

Sprints

Whiteboard

Already implemented in popt from years. _secure_getenv was introduced 2003 popt 1.4. Strange that open wall need to patch it

Openwall focuses on stable and changes iff there is need. That's quite sane for a security focussed distro, audits are hard to do correctly.

(?)

Work Items

This blueprint contains Public information 
Everyone can see this information.

Subscribers

No subscribers.