>> Actually LD_LIBRARY_PATH* needn't be set to run Firefox. Since RUNPATH >> is set to /usr/lib/gnome-private/lib while building Firefox and the >> newer GNOME components, Firefox will pick up the new versions even >> without setting LD_LIBRARY_PATH. >> >> So instead of setting LD_LIBRARY_PATH, will unsetting it if user has >> already set it, be enough to prevent this attack ? > > If you don't need to set it, the best solution would be to just remove > the shell script code to set it, and let any setting from the environment > pass through on it's own.
Ok,thanks. I'll clarify how it affects the man-in-middle issue in section 4.2 from my team and update ARC material. > This isn't an "attack", just preventing the > path you set from affecting other processes - if you don't set one, then > that's not a problem. Sorry for being unclear - I was referring to the man-in-middle issue from section 4.2 when I said 'attack' : Firefox 3.5.x man-in-middle issue handling : /usr/bin/firefox will be a script that calls /usr/lib/firefox/run-mozilla.sh which will then call firefox-bin. /usr/bin/firefox and run-mozilla.sh scripts set a number of environment variables. All the plugins are spawned by firefox-bin. So, LD_LIBRARY_PATH environment variable will be set to /usr/lib/gnome-private in run-mozilla.sh script to avoid linking/loading of the plugins with libraries older/different versions of the new libraries and they will always link to /usr/lib/gnome-private libraries. Thanks Hemantha