This is the mail archive of the glibc-bugs@sourceware.org mailing list for the glibc project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug libc/17100] secure_getenv() does not seem to properly detect if an environment is secure


https://sourceware.org/bugzilla/show_bug.cgi?id=17100

--- Comment #5 from Florian Weimer <fweimer at redhat dot com> ---
(In reply to Brent Cook from comment #4)
> Though AT_SECURE is available in all kernels that glibc supports, is there
> be any way for an adversary to cause the fallback case to be triggered
> through external means?

No, the kernel prepares the aux vector as part of the execve implementation. 
It is possible to invoke the new process through userspace emulation, supplying
a bogus aux vector, but then, no privilege transition occurs, so there is no
security impact.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]