GLSA 200512-07: OpenLDAP, Gauche: RUNPATH issues

Severity:low
Title:OpenLDAP, Gauche: RUNPATH issues
Date:12/15/2005
Bugs: #105380, #112577
ID:200512-07

Synopsis

OpenLDAP and Gauche suffer from RUNPATH issues that may allow users in the "portage" group to escalate privileges.

Background

OpenLDAP is a suite of LDAP-related application and development tools. Gauche is an R5RS Scheme interpreter.

Affected packages

Package Vulnerable Unaffected Architecture(s)
net-nds/openldap < 2.2.28-r3 >= 2.2.28-r3 All supported architectures
dev-scheme/gauche < 0.8.6-r1 >= 0.8.6-r1 All supported architectures

Description

Gentoo packaging for OpenLDAP and Gauche may introduce insecure paths into the list of directories that are searched for libraries at runtime.

Impact

A local attacker, who is a member of the "portage" group, could create a malicious shared object in the Portage temporary build directory that would be loaded at runtime by a dependent binary, potentially resulting in privilege escalation.

Workaround

Only grant "portage" group rights to trusted users.

Resolution

All OpenLDAP users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose net-nds/openldap

All Gauche users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-scheme/gauche-0.8.6-r1"

References

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200512-07.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

Thank you!