Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 10 Jul 2012 18:22:28 +0400
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Subject: Re: libdbus hardening

On Tue, Jul 10, 2012 at 04:11:12PM +0200, Sebastian Krahmer wrote:
> I am fine with either solution and would prefer upstream patches
> anyway, but it turned out in past that nobody from upstream
> is willing to add such patches.

If this is not for upstream and you only need it working on a particular
distro with glibc, then why not use __secure_getenv()?

> I tried a year ago with openssl and AFAIK its still suffering
> (at least I never heared back).
> 
> If you compile your openssh '--with-ssl-engine' you have
> an easy root exploit (given that ssh-keysign is mode 04755
> such as on Debian) via OPENSSL_config().
> 
> If you ask me, thats quite poor for a framework that wants to
> add security to the system.
> So, I do not have any problems adding our own patch sets rather
> than waiting for another year.

Of course.

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.