This is the mail archive of the glibc-bugs@sourceware.org mailing list for the glibc project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug libc/12393] ld.so: insecure handling of privileged programs' RPATHs with $ORIGIN


http://sourceware.org/bugzilla/show_bug.cgi?id=12393

Petr Baudis <pasky at suse dot cz> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Attachment #5684|0                           |1
        is obsolete|                            |

--- Comment #9 from Petr Baudis <pasky at suse dot cz> 2011-05-05 16:52:15 UTC ---
Created attachment 5708
  --> http://sourceware.org/bugzilla/attachment.cgi?id=5708
updated patch

Fair point. The updated patch is to replace the original one, instead relaxing
the original restriction on $ORIGIN not being alone in the path. Instead, in
case of a setuid binary, it verifies fully expanded and /../-normalized path
elements where $ORIGIN has occurred against the list of trusted paths.

-- 
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]