svn commit: r318313 - head/libexec/rtld-elf

Konstantin Belousov kostikbel at gmail.com
Mon May 15 19:25:36 UTC 2017


On Mon, May 15, 2017 at 01:08:55PM -0600, Ian Lepore wrote:
> Well, for example, it seems like it would allow anyone to execute a
> binary even if the sysadmin had set it to -x specifically to prevent
> people from running it.

The direct mode does not (and cannot) honor set{u,g}id modes of the
executable, so any binary run this way would only exercise the existing
power of the user which did it.

The most advanced explanation that I was given in private was among
the lines: "if you have an environment where users can upload content
to a shared server, but have no access to chmod(2), no compilers, no
scripting languages, etc." The person then admitted that (s)he does not
consider it as an actual concern.

If somebody is worried about this or similar scenario, I might add too
restrictive check, e.g. requiring u+x if user is owner, g+x is primary
user group is the group of file, and o+x otherwise. This would be strict
subset of the normal unix checks and ACL would be also ignored.
Still I am not convinced.


More information about the svn-src-head mailing list