|
Message-ID: <20140614160302.GH23102@port70.net> Date: Sat, 14 Jun 2014 18:03:02 +0200 From: Szabolcs Nagy <nsz@...t70.net> To: musl@...ts.openwall.com Subject: Re: Binaries compiled with musl (1.1.2) are vulnerable to an ancient ldd exploit * Daniel Cegie??ka <daniel.cegielka@...il.com> [2014-06-14 17:51:43 +0200]: > musl checks suid/sgid > > http://git.musl-libc.org/cgit/musl/tree/src/ldso/dynlink.c#n984 > http://git.musl-libc.org/cgit/musl/tree/src/ldso/dynlink.c#n1201 this is the relevant line: musl's loader exits before executing main in ldd mode independently of setuid or env vars the checked binary has no control over this at all in glibc the interpreter linked into the binary has to do the right thing.. and it used to fail to do that (and of course if you have a binary with non-glibc interpreter it does the wrong thing with arbitrarily bad consequences..)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.