|
Message-ID: <20140614161656.GH179@brightrain.aerifal.cx> Date: Sat, 14 Jun 2014 12:16:56 -0400 From: Rich Felker <dalias@...c.org> To: musl@...ts.openwall.com Subject: Re: Binaries compiled with musl (1.1.2) are vulnerable to an ancient ldd exploit On Sat, Jun 14, 2014 at 06:03:02PM +0200, Szabolcs Nagy wrote: > * Daniel Cegie??ka <daniel.cegielka@...il.com> [2014-06-14 17:51:43 +0200]: > > musl checks suid/sgid > > > > http://git.musl-libc.org/cgit/musl/tree/src/ldso/dynlink.c#n984 > > > > http://git.musl-libc.org/cgit/musl/tree/src/ldso/dynlink.c#n1201 > > this is the relevant line: musl's loader exits before > executing main in ldd mode independently of setuid or > env vars the checked binary has no control over this > at all Steven Honeyman's original report was in regard to using the glibc ldd utility with musl binaries. This just executes the program normally, but it does not give you any elevated privileges you wouldn't already have by executing it directly. Rich
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.