Control: tags -1 + moreinfo

Am 09.07.2014 14:06, schrieb Jakub Wilk:
> Package: openjdk-7-jdk
> Version: 7u60-2.5.0-1
> Severity: important
> Tags: security
> 
> Binaries in /usr/lib/jvm/java-7-openjdk-i386/bin/ have their RPATH set to
> relative directories:
> bootstrap/jre/lib/i386
> bootstrap/jre/lib/i386/jli
> bootstrap/lib/i386
> 
> This means that the aforementioned tools cannot be securely used if cwd is
> world-writable (e.g. /tmp). If local malicious user planted a trojaned library
> there, the tools would happily load it.

how did you do this analysis, and how can I reproduce this?


-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to