From: "Dmitry V. Levin" <ldv@altlinux.org>
To: "Kirill A. Shutemov" <kirill@shutemov.name>
Cc: Michail Yakushin <silicium@altlinux.org>,
ALT Linux Team development discussions <devel@lists.altlinux.org>,
"Konstantin A. Lepikhov" <lakostis@unsafe.ru>
Subject: Re: [devel] suid binaries and ELF Auxiliary Vectors
Date: Fri, 25 Sep 2009 13:12:26 +0400
Message-ID: <20090925091226.GC21891@wo.int.altlinux.org> (raw)
In-Reply-To: <cc557aab0909250123k361f438fk3efd13753fcbd434@mail.gmail.com>
[-- Attachment #1: Type: text/plain, Size: 1032 bytes --]
On Fri, Sep 25, 2009 at 11:23:47AM +0300, Kirill A. Shutemov wrote:
> On Fri, Sep 25, 2009 at 11:15 AM, Kirill A. Shutemov
> <kirill@shutemov.name> wrote:
> > 2009/9/25 Konstantin A. Lepikhov <lakostis@unsafe.ru>:
> >> http://people.redhat.com/drepper/elftut1.ps -
> >
> > Thanks for link.
> >
> >> "The function create_elf_tables is responsible for
> >> creating the user stack which includes creating the auxiliary vector."
> >
> > Yep, I see. It really creates auxv on suid binaries. At least it reaches
> > copy_to_user(sp, elf_info, ei_index * sizeof(elf_addr_t))
> > But still there is no auxv in userspace. :(
> >
>
> It seems problem is in glibc. When I compiled similar code with
> klibc, it works fine.
>
> Dmitry, could you comment it? Probably, it's security-related
> thing. What's the point?
Every ELF executable gets an auxv, but when glibc detects that the running
process is privileged, it mangles its environment and, besides all, sets
__libc_enable_secure variable to 1.
--
ldv
[-- Attachment #2: Type: application/pgp-signature, Size: 197 bytes --]
next prev parent reply other threads:[~2009-09-25 9:12 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-09-25 7:38 Kirill A. Shutemov
2009-09-25 8:15 ` Kirill A. Shutemov
2009-09-25 8:23 ` Kirill A. Shutemov
2009-09-25 9:12 ` Dmitry V. Levin [this message]
2009-09-25 9:24 ` Sergey Vlasov
2009-09-25 10:05 ` Kirill A. Shutemov
2009-09-25 10:20 ` Kirill A. Shutemov
2009-09-25 9:29 ` Andrey Rahmatullin
2009-09-25 9:35 ` Dmitry V. Levin
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20090925091226.GC21891@wo.int.altlinux.org \
--to=ldv@altlinux.org \
--cc=devel@lists.altlinux.org \
--cc=kirill@shutemov.name \
--cc=lakostis@unsafe.ru \
--cc=silicium@altlinux.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
ALT Linux Team development discussions
This inbox may be cloned and mirrored by anyone:
git clone --mirror http://lore.altlinux.org/devel/0 devel/git/0.git
# If you have public-inbox 1.1+ installed, you may
# initialize and index your mirror using the following commands:
public-inbox-init -V2 devel devel/ http://lore.altlinux.org/devel \
devel@altlinux.org devel@altlinux.ru devel@lists.altlinux.org devel@lists.altlinux.ru devel@linux.iplabs.ru mandrake-russian@linuxteam.iplabs.ru sisyphus@linuxteam.iplabs.ru
public-inbox-index devel
Example config snippet for mirrors.
Newsgroup available over NNTP:
nntp://lore.altlinux.org/org.altlinux.lists.devel
AGPL code for this site: git clone https://public-inbox.org/public-inbox.git