[Pkg-privacy-commits] [libgsecuredelete] 39/168: Added a TODO-list with the current issues.
Ulrike Uhlig
u-guest at moszumanska.debian.org
Thu Jul 7 20:06:36 UTC 2016
This is an automated email from the git hooks/post-receive script.
u-guest pushed a commit to branch master
in repository libgsecuredelete.
commit 763176543a813ad7f3d481f849889ddef381e382
Author: Colomban Wendling <ban at herbesfolles.org>
Date: Sat Oct 17 03:55:31 2009 +0200
Added a TODO-list with the current issues.
---
TODO | 57 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 57 insertions(+)
diff --git a/TODO b/TODO
new file mode 100644
index 0000000..8da478d
--- /dev/null
+++ b/TODO
@@ -0,0 +1,57 @@
+'*' means important things, '+' means cool things, '-' means things that might
+be done.
+FIXMEs are things that needs to be fixed (the code is here but needs fixing);
+TODOs are things that needs to be created (there is no code for them):
+There are some FIMXE/TODO in the code that are not listed here: it could be
+either a mess or a code-specific thing that is not important enough or too
+specific to be listed here.
+
+See result of `rgrep FIXME gsecuredelete` and `rgrep TODO gsecuredelete` too.
+
+
+FIXMEs:
+* Do NOT use search path for launching commands
+ (gsecuredelete/securedelete-operation.vala:24).
+ This is a SECURITY VULNERABILITY if the PATH (or the system default
+ search path, or whatever used to find a command) used by a program with
+ great rights using this library was tuned by a malicious user (or if the
+ owner of the great rights is stupid, but for this we can't do anything).
+ The vulnerability occurs if a user may modify the PATH used to search
+ for the spawned commands of another user (and maybe root): this malicious
+ user may then create its own command that gets launched in place of the
+ expected one, with the launcher's rights.
+ Of course, it should not happens in a perfect environment with prefect
+ users, but this library is not only meant for Heaven.
+ .
+ An easy fix for this is to hardcode the command's path to something like
+ /bin/<command> or another highly standard path, but this is not flexible.
+ A better fix would be to use a user-specified command (and prehaps fall
+ back to a hardcoded default if none found) through a configuration file.
+ Even more better would be to have a system-wide configuration file
+ (something like a configuration file in /etc or so) and per-user ones,
+ allowing each user to use its own tools if needed/wanted.
+
++ Get the pass number reported by the program rather than guessing it.
+ (gsecuredelete/securedelete-operation.vala:88).
+ Not sure it is useful or really cleanly doable.
+
+? (SwapOperation) is /proc/swaps a good method to know if a swap device is in
+ use?
+ Neither sure it is wrong to read /proc/swaps nor the swap wiping is supported
+ in practice on non-Linus OS.
+
+
+TODOs:
+* Test MemOperation (gsecuredelete/mem-operation.vala:23).
+ This needs a courageous user! (Having a small amount of memory is probably
+ better as this operation may be slow (as the manual of smem says)).
+
++ Be able to work as another user? (gsecuredelete/async-operation.vala:40)
+ find informations about this issue and what can/could/should be done to
+ fix it.
+ Perhaps it is not the library that should provide the functionnality but
+ the caller program that may grant its rights or so, don't know.
+
+- Support for canonical names/paths. (gsecuredelete/delete-operation.vala:66)
+ This affects all operations using paths, but in first place DeleteOperation
+ that supports adding/removing of deletion targets.
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-privacy/packages/libgsecuredelete.git
More information about the Pkg-privacy-commits
mailing list