Bug 9541 - security suggestion for traceroute
Summary: security suggestion for traceroute
Status: CLOSED DUPLICATE of bug 13466
Alias: None
Product: Red Hat Linux
Classification: Retired
Component: traceroute   
(Show other bugs)
Version: 6.2
Hardware: All Linux
Target Milestone: ---
Assignee: Crutcher Dunnavant
QA Contact:
Depends On:
TreeView+ depends on / blocked
Reported: 2000-02-18 01:22 UTC by wingc
Modified: 2008-05-01 15:37 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2000-04-03 15:28:38 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

Description wingc 2000-02-18 01:22:42 UTC
It would be nice to drop all privileges in traceroute immediately at
program initialization time, rather than after parsing arguments. I can see
where a few buffer overflows were patched in the parser, but why risk the
possibility of another one? (can you be totally sure that all those string
functions in glibc won't break in any way in the future?)

Here is a patch that moves all privileged operations to the beginning of
main(), and then drops all privileges:


This breaks the '-d' option to traceroute unless you are root, because only
root can set SO_DEBUG. However, I can't get '-d' to do anything useful here
anyway, so I'm not sure if it really matters.

If '-d' actually does do something useful, I can fix that too, let me know.


Chris Wing

Comment 1 Bill Nottingham 2000-04-03 15:28:59 UTC
*** Bug 10517 has been marked as a duplicate of this bug. ***

Comment 2 Jeff Johnson 2000-07-19 03:42:40 UTC

*** This bug has been marked as a duplicate of 13466 ***

Note You need to log in before you can comment on or make changes to this bug.