|
Message-ID: <20140614183725.GA13279@openwall.com> Date: Sat, 14 Jun 2014 22:37:25 +0400 From: Solar Designer <solar@...nwall.com> To: musl@...ts.openwall.com Subject: Re: Binaries compiled with musl (1.1.2) are vulnerable to an ancient ldd exploit On Sat, Jun 14, 2014 at 02:29:42PM -0400, Rich Felker wrote: > Stock glibc accepts all of the LD_* environment variables for > suid/sgid, including dangerous ones, and only applies weak > restrictions to them (for example it even allows LD_PRELOAD after > imposing some insufficient conditions on the library to be preloaded). Oh, I recall it allows LD_PRELOAD on libraries that are placed in system directories and are themselves marked with the SUID bit. IIRC, libc5's dynamic linker had that, too. Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.