Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 19 Feb 2015 23:50:37 -0800
From: Paul Pluzhnikov <ppluzhnikov@...gle.com>
To: Rich Felker <dalias@...c.org>
Cc: oss-security@...ts.openwall.com
Subject: Re: Fixing the glibc runtime linker

On Thu, Feb 19, 2015 at 11:34 PM, Rich Felker <dalias@...c.org> wrote:

> I don't see how you think this is a security issue at all.

I think the point is that 'system(argv[1])' is a hard mistake to make
by accident, but empty or relative RPATH is easy, and is not
immediately discoverable: you have to run 'readelf -d a.out' and then
think about what you see.


-- 
Paul Pluzhnikov

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.