Bug#566351: libgcrypt11: should not change user id as a side effect

2012-11-07 Thread Werner Koch
On Sat, 3 Nov 2012 18:29, ametz...@downhill.at.eu.org said: comment sums it up: https://bugs.launchpad.net/debian/+source/sudo/+bug/423252/comments/72 Well, it is the usual problem with inter-library dependencies. We will never be able to get this right. The DSO is just not designed to work

Bug#566351: libgcrypt11: should not change user id as a side effect

2012-11-03 Thread Andreas Metzler
On 2010-01-23 Andreas Metzler ametz...@downhill.at.eu.org wrote: On 2010-01-23 Ansgar Burchardt ans...@2008.43-1.org wrote: the function lock_pool from src/secmem.c has the side effect of changing user ids if real uid != effective uid. This causes strange behaviour in other programs: A

Bug#566351: libgcrypt11: should not change user id as a side effect

2010-01-27 Thread Simon Josefsson
Ansgar Burchardt ans...@43-1.org writes: Werner Koch w...@gnupg.org writes: On Mon, 25 Jan 2010 16:13, ans...@43-1.org said: Yes, it is even quite simple to write such an application: Just call getgroups(), getpwent(), ... on a system that uses LDAP. If there is no caching daemon like

Bug#566351: libgcrypt11: should not change user id as a side effect

2010-01-27 Thread Werner Koch
On Wed, 27 Jan 2010 01:17, ans...@43-1.org said: There are enough sensible reasons for an application using gcrypt only indirectly (eg. applications using gnutls should not need to care which cryptographic library is used by it, more so for applications that only use a library like libcurl

Bug#566351: libgcrypt11: should not change user id as a side effect

2010-01-27 Thread Ansgar Burchardt
Hi, Simon Josefsson si...@josefsson.org writes: It can run in a separate process if nscd (glibc's name service caching daemon) is running. But if nscd is not installed or not running for some reason, there is not much to do except doing the query in the same process. Why can't the system

Bug#566351: libgcrypt11: should not change user id as a side effect

2010-01-27 Thread Simon Josefsson
Ansgar Burchardt ans...@43-1.org writes: Hi, Simon Josefsson si...@josefsson.org writes: It can run in a separate process if nscd (glibc's name service caching daemon) is running. But if nscd is not installed or not running for some reason, there is not much to do except doing the query

Bug#566351: libgcrypt11: should not change user id as a side effect

2010-01-26 Thread Florian Weimer
* Werner Koch: That is a broken design. glibc should never ever allow suid processes to run code from external services it is not 100% sure they are clean. I guess libnss_files and the other standard ones might be fine, but LDAP or even LDAPS are very problematic. Such code belongs into a

Bug#566351: libgcrypt11: should not change user id as a side effect

2010-01-26 Thread Ansgar Burchardt
Werner Koch w...@gnupg.org writes: On Mon, 25 Jan 2010 16:13, ans...@43-1.org said: Yes, it is even quite simple to write such an application: Just call getgroups(), getpwent(), ... on a system that uses LDAP. If there is no caching daemon like nscd running, the application will use

Bug#566351: libgcrypt11: should not change user id as a side effect

2010-01-25 Thread Werner Koch
Hi! I understand that there is sometimes the need for lifetime long suid programs. Although, I don't think that it is a sensible approach to write software this way (instead of using helpers like userv), I can add a hack to disable dropping of permissions. Ansgar, is it that what you want?

Bug#566351: libgcrypt11: should not change user id as a side effect

2010-01-25 Thread Ansgar Burchardt
Hi, Werner Koch w...@gnupg.org writes: I understand that there is sometimes the need for lifetime long suid programs. Although, I don't think that it is a sensible approach to write software this way (instead of using helpers like userv), I can add a hack to disable dropping of permissions.

Bug#566351: libgcrypt11: should not change user id as a side effect

2010-01-25 Thread Werner Koch
On Mon, 25 Jan 2010 14:24, ans...@2008.43-1.org said: Yes, that is fine with me. Changing the default may break assumptions made by existing applications after all. Of course we will not change the default. It would be nice if the documentation could mention that libraries that initialize

Bug#566351: libgcrypt11: should not change user id as a side effect

2010-01-25 Thread Ansgar Burchardt
Werner Koch w...@gnupg.org writes: Are you trying to tell us that there is an application with dependencies to libnss, openldap and gnutls and that one is intended to be run suid? Did you audit all that code and the way the code is used to be written properly in a way that the suid-ness is

Bug#566351: libgcrypt11: should not change user id as a side effect

2010-01-25 Thread Werner Koch
On Mon, 25 Jan 2010 16:13, ans...@43-1.org said: Yes, it is even quite simple to write such an application: Just call getgroups(), getpwent(), ... on a system that uses LDAP. If there is no caching daemon like nscd running, the application will use libnss-ldap (via glibc's Name Service

Bug#566351: libgcrypt11: should not change user id as a side effect

2010-01-23 Thread Andreas Metzler
On 2010-01-23 Ansgar Burchardt ans...@2008.43-1.org wrote: the function lock_pool from src/secmem.c has the side effect of changing user ids if real uid != effective uid. This causes strange behaviour in other programs: A program using libnss-ldap for querying group membership with SSL

Bug#566351: libgcrypt11: should not change user id as a side effect

2010-01-22 Thread Ansgar Burchardt
Package: libgcrypt11 Version: 1.4.4-6 Severity: normal Hi, the function lock_pool from src/secmem.c has the side effect of changing user ids if real uid != effective uid. This causes strange behaviour in other programs: A program using libnss-ldap for querying group membership with SSL