Hacker News new | past | comments | ask | show | jobs | submit login

Meh? It only works on your own programs.



What do you mean? There are many examples of people using LD_PRELOAD to patch the behaviour of other's binaries.


Sure, but not across a security boundary.

Being able to override some library function such that running my text editor does $BADTHING isn't very interesting from a security perspective: if I have the capability to do that, I could also just run a program that does $BADTHING directly. Why bother with additional contortions to involve the text editor?


Malicious program without LD_PRELOAD can still copy the binary to other folder and sufficiently change the menu to point to the copy. Then modify the copy by binary patching to do whatever. Or run it via modified qemu to do whatever. The main problem is the lack of a proper sandbox and that all programs in user session generally have the same permissions.


No, I mean programs that you are executing as your own user.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: