From gzip-1.3.12/NEWS:

...
Major changes in Gzip 1.3.11 (2007-02-05)

* As per the GNU coding standards, the behavior of gzip and its
  companion executables no longer depend on the name used to invoke them.
  For example, 'gzip' and 'gunzip' are no longer hard links;
  instead, 'gunzip' is now a small program that invokes 'gzip -d'.
...


Looking into /usr/local/bin/gzunip:

joerg @ taifun> cat /usr/local/bin/gunzip #!/bin/bash
PATH=${GZIP_BINDIR-'/usr/local/bin'}:$PATH
exec gzip -d "$@"
joerg @ taifun>

Hmmm, doesn't this open a new security hole?

Formerly a (possibly suid) program could do
        execl ("/usr/local/bin/gunzip", arg1, arg2, arg3, ...);
and was more or less safe to execute the well known program.

Now an attacker can trick this program with
        GZIP_BINDIR=/tmp/something program
to get /tmp/something/gzip executed.

But then: executing suid programes with possibly polluted environment
isn't safe anyway.

  Joerg
--
Mail: [EMAIL PROTECTED]    Tel: 2198
Real: Joerg Lehners, Informatik ARBI, Uni Oldenburg, D-26111 Oldenburg
Unwoerter: Kostensenkung - Gewinnmaximierung - billig, billig, billig


Reply via email to