Debian / SE/Linux - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=193664
Ben Lindstrom
mouring at etoh.eviladmin.org
Mon May 31 03:57:27 EST 2004
On Sun, 30 May 2004, Luke Kenneth Casson Leighton wrote:
> > > the ssh-agent fd close-on-exec is actually a really important
> > > security bug because otherwise you end up with an open file
> > > descriptor being passed over to a process that should have no
> > > rights or use for it.
> >
> > The FD in question is to /dev/null and closed anyway if it isn't
> > dup'd to one of std{in.out,err} so I can't see how this achieves
> > anything.
>
> well, i'd be remiss in not mentioning it to you: fortunately
> in this case it looks like it's covered.
>
> it'd be really helpful, however, if you _could_ apply that
> close-on-exec, because without it, it's necessary to add an
> audit "ignore" just for that file handle, which could come
> back and bite you later, or to constantly and forever apply
> that patch in all releases of an openssh'd selinux package.
>
Why not just fix the auditing software to understand the fact that the FD
is /dev/null? That would be the best solution for everyone. Since it
would stops incorrect whining, and it doesn't require a useless hack where
one is not needed.
There is nothing worse than a whiny auditing tool that gives you crap
output with a few pearls of useful information. =)
- Ben
More information about the openssh-unix-dev
mailing list