Re: [OFF-TOPIC] it's bug? fact? wtf?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi...

[root@jaspion tmp]# su jorge
[jorge@jaspion tmp]$ ./prog
bash: ./prog: Permission Deny
[jorge@jaspion tmp]$ ls -la prog
-rwxr--r-- 1 root root 6648 2007-07-21 11:21 prog
[jorge@jaspion tmp]$ /lib/ld-linux.so.2 ./prog
huhu! o/
[jorge@jaspion tmp]$

 it's bug? or the "ld-linux" read the elf and execute? so, dynamic
linker/loader?
That's correct behaviour. AFAIK, ld-linux.so could sometimes works as
loader (as we all know), but it can be invoked as executable. In the
latter case, you provide an ELF executable and it will run it.
Summary: to make a binary un-executable for certain uid, you can't
just do it by taking off its executable permission bits, but also
takes the same bits from ld-linux.so.

regards,

Mulyadi

--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx
Please read the FAQ at http://kernelnewbies.org/FAQ


[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux