This seems to be general security issue/leak concerning how dynamic linking in linux/glibc works, so let me explain what it is:
Consider building a dynamically linked binary and specifying a relative path in the ELF
INTERP
section (using the --dynamic-linker
gcc option) so you could redistribute a custom glibc version with your dynamically linked commercial application (where you are not allowed to link statically against the LGPL glibc, but still need to make your binary work across different linux distribution having different glibc versions).If you chown the binary to root, and put the set-uid flag on your binary, it effectively becomes a rootkit. As executing it from a different directory, allows you to replace the dynamic linker executable, that will be executed with root permission.
To demonstrate this, take a look at the following C code (issue.c):
// issue.c // // build like this: // DLINKER=.lib64/ld-linux-x86-64.so.2 // gcc -DNAME=\"vulnarable\" -o issue -Wl,--dynamic-linker,$DLINKER issue.c // sudo chown root issue // sudo chmod u+s issue // now build the code to be executed with // root permissions (we use the same issue.c): // mkdir -p .lib64/ // gcc -DNAME=\"rootkit\" -o $DLINKER --static issue.c // #include <stdio.h> int main(int argc, char* argv[]) { printf("(%s) euid:%d\n", NAME, geteuid()); }
If you now execute the set-uid binary like this
./issue
or even just do this
ldd issue
instead of getting what you might expect, e.g.
(vulnarable) euid:0
you get
(rootkit) euid:0
The point is you could replace the
ld-linux-x86-64.so.6
binary with whatever you like, and it will get executed with root permissions.Similar issues seems to have been addressed by not resolving
$ORIGIN
in RPATH
or ignoring LD_LIBRARY_PATH
if the set-uid flag is set. So I wonder if the
INTERP
in ELF has to be ignored whenever the set-uid flag is set (i.e. by using the default dynamic linker - /lib32/ld-linux.so.2
or /lib64/ld-linux-x86-64.so.2
)?So what do you think, where should this be fixed or reported - in glibc or the kernel?
The discussion at stackoverflow security issue with set-uid and a relative path for INTERP (dynamic linker) in ELF.