This is the mail archive of the
glibc-bugs@sourceware.org
mailing list for the glibc project.
[Bug libc/17100] secure_getenv() does not seem to properly detect if an environment is secure
- From: "fweimer at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: glibc-bugs at sourceware dot org
- Date: Sun, 29 Jun 2014 13:52:28 +0000
- Subject: [Bug libc/17100] secure_getenv() does not seem to properly detect if an environment is secure
- Auto-submitted: auto-generated
- References: <bug-17100-131 at http dot sourceware dot org/bugzilla/>
https://sourceware.org/bugzilla/show_bug.cgi?id=17100
--- Comment #5 from Florian Weimer <fweimer at redhat dot com> ---
(In reply to Brent Cook from comment #4)
> Though AT_SECURE is available in all kernels that glibc supports, is there
> be any way for an adversary to cause the fallback case to be triggered
> through external means?
No, the kernel prepares the aux vector as part of the execve implementation.
It is possible to invoke the new process through userspace emulation, supplying
a bogus aux vector, but then, no privilege transition occurs, so there is no
security impact.
--
You are receiving this mail because:
You are on the CC list for the bug.