Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140614160302.GH23102@port70.net>
Date: Sat, 14 Jun 2014 18:03:02 +0200
From: Szabolcs Nagy <nsz@...t70.net>
To: musl@...ts.openwall.com
Subject: Re: Binaries compiled with musl (1.1.2) are vulnerable to an
 ancient ldd exploit

* Daniel Cegie??ka <daniel.cegielka@...il.com> [2014-06-14 17:51:43 +0200]:
> musl checks suid/sgid
> 
> http://git.musl-libc.org/cgit/musl/tree/src/ldso/dynlink.c#n984
> 

http://git.musl-libc.org/cgit/musl/tree/src/ldso/dynlink.c#n1201

this is the relevant line: musl's loader exits before
executing main in ldd mode independently of setuid or
env vars the checked binary has no control over this
at all

in glibc the interpreter linked into the binary has to
do the right thing.. and it used to fail to do that
(and of course if you have a binary with non-glibc
interpreter it does the wrong thing with arbitrarily
bad consequences..)

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.