Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140614183725.GA13279@openwall.com>
Date: Sat, 14 Jun 2014 22:37:25 +0400
From: Solar Designer <solar@...nwall.com>
To: musl@...ts.openwall.com
Subject: Re: Binaries compiled with musl (1.1.2) are vulnerable to an ancient ldd exploit

On Sat, Jun 14, 2014 at 02:29:42PM -0400, Rich Felker wrote:
> Stock glibc accepts all of the LD_* environment variables for
> suid/sgid, including dangerous ones, and only applies weak
> restrictions to them (for example it even allows LD_PRELOAD after
> imposing some insufficient conditions on the library to be preloaded).

Oh, I recall it allows LD_PRELOAD on libraries that are placed in system
directories and are themselves marked with the SUID bit.  IIRC, libc5's
dynamic linker had that, too.

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.