public inbox for glibc-bugs@sourceware.org
help / color / mirror / Atom feed
* [Bug dynamic-link/21718] mount noexec bypass via direct ld invocation and (ab)use of relocations onto bss
[not found] <bug-21718-131@http.sourceware.org/bugzilla/>
@ 2021-12-18 14:19 ` jinoh.kang.kr at gmail dot com
0 siblings, 0 replies; only message in thread
From: jinoh.kang.kr at gmail dot com @ 2021-12-18 14:19 UTC (permalink / raw)
To: glibc-bugs
https://sourceware.org/bugzilla/show_bug.cgi?id=21718
--- Comment #3 from Jinoh Kang <jinoh.kang.kr at gmail dot com> ---
Note that this bug can be exploited for all shared object loads, so e.g.
enable -f program.so
would also be possible.
As the trusted_for (formerly O_MAYEXEC) patch proposal [1] in Linux is
approaching towards being merged, perhaps we can use it to fix this?
[1]: https://lore.kernel.org/lkml/20211115185304.198460-1-mic@digikod.net/
--
You are receiving this mail because:
You are on the CC list for the bug.
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2021-12-18 14:19 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
[not found] <bug-21718-131@http.sourceware.org/bugzilla/>
2021-12-18 14:19 ` [Bug dynamic-link/21718] mount noexec bypass via direct ld invocation and (ab)use of relocations onto bss jinoh.kang.kr at gmail dot com
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).