<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>24334</bug_id>
          
          <creation_ts>2010-10-16 12:53:56 +0400</creation_ts>
          <short_desc>CVE-2010-3378: insecure library loading</short_desc>
          <delta_ts>2021-09-29 13:39:47 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>scilab</component>
          <version>unstable</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc>http://bugs.debian.org/598422</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>security</keywords>
          <priority>P3</priority>
          <bug_severity>blocker</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Vladimir Lettiev">crux</reporter>
          <assigned_to name="Nobody&apos;s working on this, feel free to take it">nobody</assigned_to>
          <cc>rider</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>113837</commentid>
    <comment_count>0</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2010-10-16 12:53:56 +0400</bug_when>
    <thetext>The vulnerability is introduced by an insecure change to
LD_LIBRARY_PATH, an environment variable used by ld.so(8) to look for
libraries on a directory other than the standard paths.

Vulnerable code follows:

/usr/bin/scilab-adv-cli line 280:
                    LD_LIBRARY_PATH=&quot;$JAVA_HOME/../Libraries:$LD_LIBRARY_PATH&quot;
/usr/bin/scilab-adv-cli line 459:
		    LD_LIBRARY_PATH=&quot;$JRE_HOME/lib/$proc/:$JRE_HOME/lib/$proc/server/:$JRE_HOME/lib/$proc/native_threads/:$LD_LIBRARY_PATH&quot;
/usr/bin/scilab-adv-cli line 518:
        LD_LIBRARY_PATH=&quot;$LD_LIBRARY_PATH:/sw/lib/&quot;
/usr/bin/scilab-adv-cli line 534:
LD_LIBRARY_PATH=/usr/lib/scilab/:/usr/lib64/scilab/:$LD_LIBRARY_PATH
/usr/bin/scilab line 283:
                    LD_LIBRARY_PATH=&quot;$JAVA_HOME/../Libraries:$LD_LIBRARY_PATH&quot;
/usr/bin/scilab line 462:
		    LD_LIBRARY_PATH=&quot;$JRE_HOME/lib/$proc/:$JRE_HOME/lib/$proc/server/:$JRE_HOME/lib/$proc/native_threads/:$LD_LIBRARY_PATH&quot;
/usr/bin/scilab line 521:
        LD_LIBRARY_PATH=&quot;$LD_LIBRARY_PATH:/sw/lib/&quot;
/usr/bin/scilab line 537:
LD_LIBRARY_PATH=/usr/lib/scilab/:/usr/lib64/scilab/:$LD_LIBRARY_PATH

When there&apos;s an empty item on the colon-separated list of
LD_LIBRARY_PATH, ld.so treats it as &apos;.&apos; (i.e. CWD/$PWD.)
If the given script is executed from a directory where a potential,
local, attacker can write files to, there&apos;s a chance to exploit this
bug.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>113841</commentid>
    <comment_count>1</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2010-10-16 13:30:41 +0400</bug_when>
    <thetext>По сравнению с debian у нас в scilab из shell-скриптов есть только /usr/bin/scilab
Там есть несколько точек с небезопасным изменением LD_LIBRARY_PATH:

/usr/bin/scilab line 398: LD_LIBRARY_PATH=&quot;$JRE_HOME/lib/$proc/:$JRE_HOME/lib/$proc/server/:$JRE_HOME/lib/$proc/native_threads/:$LD_LIBRARY_PATH&quot;

/usr/bin/scilab line 442:
LD_LIBRARY_PATH=$SCILIB${LD_LIBRARY_PATH+:$LD_LIBRARY_PATH}

В последнем случае лучше заменить на:
LD_LIBRARY_PATH=$SCILIB${LD_LIBRARY_PATH:+:$LD_LIBRARY_PATH}</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>115397</commentid>
    <comment_count>2</comment_count>
    <who name="nbr">nbr</who>
    <bug_when>2010-11-16 23:33:39 +0300</bug_when>
    <thetext>Это не ко мне уже.
Заодно исправьте ошибку с арифметическим переполнением при компиляции фортрана.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>115406</commentid>
    <comment_count>3</comment_count>
    <who name="Vitaly Kuznetsov">vitty</who>
    <bug_when>2010-11-17 02:12:12 +0300</bug_when>
    <thetext>$ ssh git.alt acl sisyphus scilab show     
scilab	nbr @everybody

перевесьте пакет на nobody@</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>203337</commentid>
    <comment_count>4</comment_count>
    <who name="Anton Farygin">rider</who>
    <bug_when>2021-09-29 13:39:47 +0300</bug_when>
    <thetext>В scilab-6.1.1-alt1 есть обработка пустых значений переменных в LD_LIBRARY_PATH</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>