GLSA 200512-07: OpenLDAP, Gauche: RUNPATH issues
| Severity: | low | 
| Title: | OpenLDAP, Gauche: RUNPATH issues | 
| Date: | 12/15/2005 | 
| Bugs: | , | 
| ID: | 200512-07 | 
Synopsis
OpenLDAP and Gauche suffer from RUNPATH issues that may allow users in the "portage" group to escalate privileges.Background
OpenLDAP is a suite of LDAP-related application and development tools. Gauche is an R5RS Scheme interpreter.
Affected packages
| Package | Vulnerable | Unaffected | Architecture(s) | 
|---|---|---|---|
| net-nds/openldap | < 2.2.28-r3 | >= 2.2.28-r3 | All supported architectures | 
| dev-scheme/gauche | < 0.8.6-r1 | >= 0.8.6-r1 | All supported architectures | 
Description
Gentoo packaging for OpenLDAP and Gauche may introduce insecure paths into the list of directories that are searched for libraries at runtime.
Impact
A local attacker, who is a member of the "portage" group, could create a malicious shared object in the Portage temporary build directory that would be loaded at runtime by a dependent binary, potentially resulting in privilege escalation.
Workaround
Only grant "portage" group rights to trusted users.
Resolution
All OpenLDAP users should upgrade to the latest version:
    # emerge --sync
    # emerge --ask --oneshot --verbose net-nds/openldap
    All Gauche users should upgrade to the latest version:
    # emerge --sync
    # emerge --ask --oneshot --verbose ">=dev-scheme/gauche-0.8.6-r1"
References
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
