Multiple libraries privilege checking (PATCH for RPM e popt from open wall)
On the oss-security mailing list Sebastian Krahmer wrote :
"Hi,
Its probably about time to review libraries that are commonly
linked to (formerly-) suid programs, such as
libldap, libssl etc. In near future, in the advent of file caps
they are often lacking proper checks.
They usually just compare uid against euid (not even gid sometimes)
and do not check the dumpable flag or AT_SECURE (dont know whether
glibc exports a proper function to easily check that at all).
"
(look here for the complete post : http://
and Solar Designer of the project Openwall answered :
"> Its probably about time to review libraries that are commonly
> linked to (formerly-) suid programs, such as
> libldap, libssl etc. In near future, in the advent of file caps
> they are often lacking proper checks.
Good idea.
> They usually just compare uid against euid (not even gid sometimes)
> and do not check the dumpable flag or AT_SECURE (dont know whether
> glibc exports a proper function to easily check that at all).
glibc exports the __libc_
based on AT_* including AT_SECURE. It also exports __secure_getenv().
"
(look here for the complete post http://
So i think is not so bad to review the path posted above and integrate it if applicable in popt 1.17DEVEL HEAD
Blueprint information
- Status:
- Complete
- Approver:
- devzero2000
- Priority:
- Low
- Drafter:
- devzero2000
- Direction:
- Approved
- Assignee:
- devzero2000
- Definition:
- Superseded
- Series goal:
- None
- Implementation:
- Blocked
- Milestone target:
- 1.17
- Started by
- devzero2000
- Completed by
- devzero2000
Related branches
Related bugs
Sprints
Whiteboard
Already implemented in popt from years. _secure_getenv was introduced 2003 popt 1.4. Strange that open wall need to patch it
Openwall focuses on stable and changes iff there is need. That's quite sane for a security focussed distro, audits are hard to do correctly.