> From: Solar Designer <so...@openwall.com>
> Sent: Friday, May 16, 2025 10:59 PM
> To: Carlos O'Donell <car...@redhat.com>
> Cc: oss-security@lists.openwall.com
> Subject: Re: [oss-security] The GNU C Library security advisories update for 
> 2025-05-16
>
> [...]
>
> Notably, Go produces static binaries, and I guess would include glibc from 
> its own build?  Do they also use any of the affected functions?
> Searching around shows people building Go programs complain about the glibc 
> "warning: Using 'getaddrinfo' in statically linked applications requires at 
> runtime the shared libraries from the glibc version used for linking" (and 
> ditto for some other functions), but only a subset (maybe
> none?) of those programs would be installed SUID/SGID/setcaps.  Are we aware 
> of any?
>
> Alexander
>

Go has poor support for SUID/SGID out of the box, due to interactions between 
the semantics of goroutines and Linux setugid syscalls applying on a per-thread 
basis. AIUI it's explicitly advised to not drop/gain privileges within a Golang 
binary itself. I would imagine capabilities have similar drawbacks since they 
are also per-thread attributes. 

OTOH, much of the Golang software I've seen that does need privileges tends to 
be run as root directly, making this attack a bit of a moot point. 

Reply via email to