Bug 643306 (CVE-2010-3847)
Summary: | CVE-2010-3847 glibc: ld.so insecure handling of $ORIGIN in LD_AUDIT for setuid/setgid programs | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Tomas Hoger <thoger> | ||||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||
Status: | CLOSED ERRATA | QA Contact: | |||||||
Severity: | high | Docs Contact: | |||||||
Priority: | high | ||||||||
Version: | unspecified | CC: | ajb, amyagi, bob69xxx, cody, csieh, ebachalo, fweimer, gowmonster, herrold, jakub, jeder, jlieskov, jszep, kbsingh, kent, luke, mhlavink, mjc, mmello, nixon, pasteur, pep, pneedle, rbinkhor, rcvalle, rdassen, redhat, schwab, security-response-team, sputhenp, steve, vdanen | ||||||
Target Milestone: | --- | Keywords: | Security | ||||||
Target Release: | --- | ||||||||
Hardware: | All | ||||||||
OS: | Linux | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||
Doc Text: | Story Points: | --- | |||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2010-11-11 08:13:12 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Bug Depends On: | 643816, 643817, 643818, 643819, 643821, 643822, 643951 | ||||||||
Bug Blocks: | |||||||||
Attachments: |
|
Description
Tomas Hoger
2010-10-15 08:58:02 UTC
Public now via: http://seclists.org/fulldisclosure/2010/Oct/257 For this attack, local user needs to be able to create hard link to a setuid or setgid binary in the attacker-controlled directory. Separating setuid binaries and user-writeable directories to different file systems mitigates this issue. Tavis' advisory provides temporary mitigation steps that can be used in cases where such split is not used at the moment and can not be implemented. Auditing API for the dynmic linker is not implemented in the glibc versions in Red Hat Enterprise Linux 3 and 4. Attack described by Tavis using $ORIGIN in LD_AUDIT does not affect those versions. Created attachment 454089 [details]
Don't expand DST twice in dl_open
Created attachment 454096 [details]
Never expand $ORIGIN in privileged programs
Andreas, Is this the definitive fix ? Regards, Roberto Yokota Thanks Andreas ! Created glibc tracking bugs for this issue Affects: fedora-all [bug 643951] Is Andreas' patch in comment 22 really relevant here? This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2010:0787 https://rhn.redhat.com/errata/RHSA-2010-0787.html This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2010:0872 https://rhn.redhat.com/errata/RHSA-2010-0872.html |