oss-sec mailing list archives

Re: Fixing the glibc runtime linker


From: Paul Pluzhnikov <ppluzhnikov () google com>
Date: Thu, 19 Feb 2015 17:38:31 -0800

On Thu, Feb 19, 2015 at 2:19 PM, Tim Brown <tmb () 65535 com> wrote:

More often than not, the underlying issue is an empty element within the
DT_RPATH header or equivalent. Sometimes it's not, but even in those cases, it
is largely that one or more elements isn't qualifed (i.e. it doesn't start
with /). The attached patch fixes this, by ignoring any elements of DT_RPATH,
LD_LIBRARY_PATH that do not start with a /, and/or junking any use of dlopen
where the filename is likewise unqualified.

Won't this break stuff?

FWIW, relative RPATHs are quite fundamental to our test execution
environment, and any patch that unconditionally ignores them would
have to be reverted in our tree.

Also, don't you want to discuss this on libc-alpha? oss-security could
be all for it, but without buy-in from libc-alpha your patch is
unlikely to be going anywhere.

-- 
Paul Pluzhnikov


Current thread: