I've created a git repo to reproduce this issue without using ldopen:

https://github.com/paperclip/origin_experiment

However it now looks like this might be deliberate behaviour:
https://seclists.org/fulldisclosure/2010/Oct/257

Tavis says that expanding $ORIGIN allows attacks against SUID binaries,
and the ELF specification (
http://web.archive.org/web/20041026003725/http://www.caldera.com/developers/gabi/2003-12-17/ch5.dynamic.html#substitution
) suggests not expanding $ORIGIN for any privileged binaries.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/565002

Title:
  ldopen failing with relative path when linux capability is set

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/565002/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to