1 |
On Sat, Feb 17, 2007 at 09:39:58AM -0500, Mike Frysinger wrote: |
2 |
> On Saturday 17 February 2007, Brian Harring wrote: |
3 |
> > Security impact is from a pkg potentially dragging along old libs; if |
4 |
> > you've got a stable pkg that gets an update once every blue moon, it |
5 |
> > can hold onto the lib for a *long* time while still using the lib; |
6 |
> > thus if a vuln. in the lib, said pkg still is screwed. |
7 |
> |
8 |
> umm, no ... the package itself is updated against the new copy while the old |
9 |
> copy exists for other packages that have already been built |
10 |
|
11 |
Suspect you're ignoring soname changes, which is about all this patch |
12 |
would address- for example, ssl's old form of breakage. In that case, |
13 |
*yes* the package gets updated, anything recompiled should get the |
14 |
correct lib (assuming the code knows the appropriate linker args), but |
15 |
the old vuln. lib still will hang around as long as anything refs it. |
16 |
|
17 |
|
18 |
> > Other angle is someone intentionally forcing usage of a known bad |
19 |
> > library that is still dangling. Corner case, but doable. |
20 |
> |
21 |
> as i said, this is the "invalid" syntax: |
22 |
> ... /usr/lib/libfoo.so.3 ... |
23 |
|
24 |
Not to LD_PRELOAD :) |
25 |
|
26 |
Haven't tried anything crazy, but suspect it can be abused to override |
27 |
to the old. |
28 |
|
29 |
> > Bit curious how this is going to behave if via linked in libs, new loc |
30 |
> > and old get loaded alongside... |
31 |
> |
32 |
> this would require multiple libraries to be involved in the equation and the |
33 |
> answer is undefined behavior which most certainly result in runtime |
34 |
> failures ... |
35 |
|
36 |
Point there was that instead of just bailing with "lib is missing", |
37 |
suspect it'll manage to run, then segfault at potentially crappy |
38 |
times. |
39 |
|
40 |
~harring |