Hi tech@,
About a week ago, a patch was a committed (440a56a0) that added
issetugid() checks before a few getenv() calls. Among the changes was
one to lib/libssl/src/crypto/engine/eng_list.c, but it doesn't really
make sense to me:
- if ((load_dir = getenv("OPENSSL_ENGINES")) == 0)
+ if (issetugid() == 0 ||
+ (load_dir = getenv("OPENSSL_ENGINES")) == 0)
load_dir = ENGINESDIR;
As I understand it, a tainted process should not be looking for advice
from environment variables on how to proceed. It seems to me, however,
that the patch ensures that *only* tainted processes use the mentioned
variable.
Am I missing something here?
Keep up the good work,
Stijn