I've created a git repo to reproduce this issue without using ldopen: https://github.com/paperclip/origin_experiment
However it now looks like this might be deliberate behaviour: https://seclists.org/fulldisclosure/2010/Oct/257 Tavis says that expanding $ORIGIN allows attacks against SUID binaries, and the ELF specification ( http://web.archive.org/web/20041026003725/http://www.caldera.com/developers/gabi/2003-12-17/ch5.dynamic.html#substitution ) suggests not expanding $ORIGIN for any privileged binaries. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/565002 Title: ldopen failing with relative path when linux capability is set To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/565002/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
