This is the mail archive of the libc-hacker@sources.redhat.com mailing list for the glibc project.

Note that libc-hacker is a closed list. You may look at the archives of this list, but subscription and posting are not open.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

Re: [PATCH] Allow %n in -D_FORTIFY_SOURCE=2 linux programs if /procis not mounted


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Jakub Jelinek wrote:
> If /proc is not mounted, it is IMHO better to be less protected than
> fail on legitimate %n uses.

I'm not sure this is such a good idea.  This can potentially affect only
a handful of programs, those running before /proc is mounted and those
used fater it is unmounted.  If insight into t hose programs is hard
enough we should use your patch.

I worry about an exploit where a process running as root first run
umount for /proc to disable this and maybe other checks.

- --
â Ulrich Drepper â Red Hat, Inc. â 444 Castro St â Mountain View, CA â
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQFBdjw52ijCOnn/RHQRAijkAJ4jexDj8zWdoVHU3d5lzibKB9TtTwCeNhRu
WvfPM+zC0fIySlUIOWYMpss=
=Opea
-----END PGP SIGNATURE-----


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]