Summary: | media-sound/teamspeak-server-bin-3.0.0_beta12: scanelf: rpath_security_checks(): Security problem with relative DT_RPATH | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Benjamin Börngen-Schmidt <benjamin> |
Component: | Current packages | Assignee: | Christian Parpart (RETIRED) <trapni> |
Status: | RESOLVED FIXED | ||
Severity: | minor | ||
Priority: | High | ||
Version: | unspecified | ||
Hardware: | AMD64 | ||
OS: | Linux | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Benjamin Börngen-Schmidt
2010-01-18 09:05:43 UTC
This also aplies to beta-15 which was just released. Hey Benjamin, I'm aware of these RPATH issues. These issues *must* be fixed by upstream as this is a binary-only release and the only thing we can do about, is, to ensure, that these ELFs are executed from within a safe directory. e.g. from / - as it's root.root owned already and should not contain any false shared objects. Although, if an attacker really wants to inject a function, he can do easily using LD_PRELOAD environment variable. Please contact upstream (and CC me) if you don't mind :) Regards, Christian Parpart. those statements arent entirely true ... any set*id binary that has insecure DT_RPATH's may be exploited. i'm not saying teamspeak has set*id, just that file ownership doesnt really matter in these cases. see Bug 260331 for some trivial examples We ensure, that the TS3 server binary is just invoked from within the expected base path (that's only writable by root) and the binary has no suid bit set anyways. If you have any further concerns, please reopen and specify your thoughts on this in detail, so we can come along with a solution that fits better :) |