
oss-sec mailing list archives
RE: The GNU C Library security advisories update for 2025-05-16
From: "Caveney, Seamus G" <sgcaveney () seattleschools org>
Date: Sat, 17 May 2025 06:21:41 +0000
From: Solar Designer <solar () openwall com> Sent: Friday, May 16, 2025 10:59 PM To: Carlos O'Donell <carlos () redhat com> Cc: oss-security () lists openwall com Subject: Re: [oss-security] The GNU C Library security advisories update for 2025-05-16 [...] Notably, Go produces static binaries, and I guess would include glibc from its own build? Do they also use any of the affected functions? Searching around shows people building Go programs complain about the glibc "warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking" (and ditto for some other functions), but only a subset (maybe none?) of those programs would be installed SUID/SGID/setcaps. Are we aware of any? Alexander
Go has poor support for SUID/SGID out of the box, due to interactions between the semantics of goroutines and Linux setugid syscalls applying on a per-thread basis. AIUI it's explicitly advised to not drop/gain privileges within a Golang binary itself. I would imagine capabilities have similar drawbacks since they are also per-thread attributes. OTOH, much of the Golang software I've seen that does need privileges tends to be run as root directly, making this attack a bit of a moot point.
Current thread:
- The GNU C Library security advisories update for 2025-05-16 Carlos O'Donell (May 16)
- Re: The GNU C Library security advisories update for 2025-05-16 Solar Designer (May 16)
- RE: The GNU C Library security advisories update for 2025-05-16 Caveney, Seamus G (May 16)
- Re: The GNU C Library security advisories update for 2025-05-16 Solar Designer (May 16)