Hi tech@,

About a week ago, a patch was a committed (440a56a0) that added
issetugid() checks before a few getenv() calls. Among the changes was
one to lib/libssl/src/crypto/engine/eng_list.c, but it doesn't really
make sense to me:

    - if ((load_dir = getenv("OPENSSL_ENGINES")) == 0)
    + if (issetugid() == 0 ||
    +    (load_dir = getenv("OPENSSL_ENGINES")) == 0)
      load_dir = ENGINESDIR;

As I understand it, a tainted process should not be looking for advice
from environment variables on how to proceed. It seems to me, however,
that the patch ensures that *only* tainted processes use the mentioned
variable.

Am I missing something here?

Keep up the good work,
Stijn

Reply via email to