-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi all,

Here's an interesting security update from Slackware that gives some
information on a recent vulnerability exposed in Glibc:

glibc-2.11.1-i486-4_slack13.1.txz: Rebuilt.
       Patched "dynamic linker expands $ORIGIN in setuid library
search path".
       This security issue allows a local attacker to gain root if
they can create
       a hard link to a setuid root binary. Thanks to Tavis Ormandy.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847
       http://seclists.org/fulldisclosure/2010/Oct/257
       (* Security fix *)

The seclist.org link is particularly interesting since it explains the
vulnerability in detail.

What's the implication for LFS? I've just finished chapter 5 (temp
tools) of LFS 6.7 and I'm about ready to start chapter 6. LFS uses
Glibc 2.12, not 2.11, but I would think the vulnerability is still
there. When I go to http://ftp.gnu.org/gnu/glibc/ the most recent
version is the same one we're using for LFS 6.7 from August 2010.

So:

1) Is it worth downloading and using the development version of Glibc
from git://sourceware.org/git/glibc.git to build LFS with the updated
source?

2) Can I build the updated git-checkout version of Glibc with the
standard version I built in the /tools directory? I don't/ /think
there should be a problem, but I'm not sure.

3) How do you folks handle security issues like this?

Regards,

- -Drew




-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkzEUvMACgkQ7ZZ4z2wRxN1iZgCbBkCfoGPY+BigdB0mZDXPXTFC
sP8An3vysUewdmwoHWtCgSljOQ1PP7Dr
=Ypun
-----END PGP SIGNATURE-----

-- 
http://linuxfromscratch.org/mailman/listinfo/lfs-dev
FAQ: http://www.linuxfromscratch.org/faq/
Unsubscribe: See the above information page

Reply via email to