Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 14 Jun 2014 12:16:56 -0400
From: Rich Felker <dalias@...c.org>
To: musl@...ts.openwall.com
Subject: Re: Binaries compiled with musl (1.1.2) are vulnerable to an
 ancient ldd exploit

On Sat, Jun 14, 2014 at 06:03:02PM +0200, Szabolcs Nagy wrote:
> * Daniel Cegie??ka <daniel.cegielka@...il.com> [2014-06-14 17:51:43 +0200]:
> > musl checks suid/sgid
> > 
> > http://git.musl-libc.org/cgit/musl/tree/src/ldso/dynlink.c#n984
> > 
> 
> http://git.musl-libc.org/cgit/musl/tree/src/ldso/dynlink.c#n1201
> 
> this is the relevant line: musl's loader exits before
> executing main in ldd mode independently of setuid or
> env vars the checked binary has no control over this
> at all

Steven Honeyman's original report was in regard to using the glibc ldd
utility with musl binaries. This just executes the program normally,
but it does not give you any elevated privileges you wouldn't already
have by executing it directly.

Rich

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.