>> Actually LD_LIBRARY_PATH* needn't be set to run Firefox. Since RUNPATH
>> is set to /usr/lib/gnome-private/lib while building Firefox and the
>> newer GNOME components, Firefox will pick up the new versions even
>> without setting LD_LIBRARY_PATH.
>>
>> So instead of setting LD_LIBRARY_PATH, will unsetting it if user has
>> already set it, be enough to prevent this attack ?
>
> If you don't need to set it, the best solution would be to just remove
> the shell script code to set it, and let any setting from the environment
> pass through on it's own.   

Ok,thanks. I'll clarify how it affects the man-in-middle issue in 
section 4.2
from my team and update ARC material.

> This isn't an "attack", just preventing the
> path you set from affecting other processes - if you don't set one, then
> that's not a problem.

Sorry for being unclear - I was referring to the man-in-middle issue from
section 4.2 when I said 'attack' :

        Firefox 3.5.x man-in-middle issue handling : /usr/bin/firefox will be a
        script that calls /usr/lib/firefox/run-mozilla.sh which will then call
        firefox-bin. /usr/bin/firefox and run-mozilla.sh scripts set a number of
        environment variables.  All the plugins are spawned by firefox-bin. So,
        LD_LIBRARY_PATH environment variable will be set to
        /usr/lib/gnome-private in run-mozilla.sh script to avoid linking/loading
        of the plugins with libraries older/different versions of the new
        libraries and they will always link to /usr/lib/gnome-private libraries.


Thanks
Hemantha





Reply via email to