mirror of https://gitee.com/openkylin/glibc.git
pro-actively disable LD_AUDIT for setuid binaries, regardless
of where the libraries are loaded from. This is to try to make sure that CVE-2010-3856 cannot sneak back in. Upstream is unlikely to take this, since it limits the functionality of LD_AUDIT. Gbp-Pq: Topic ubuntu Gbp-Pq: Name local-disable-ld_audit.diff
This commit is contained in:
parent
9c2d95a0e9
commit
22ba7cee9c
|
@ -2504,7 +2504,7 @@ process_dl_audit (char *str)
|
||||||
char *p;
|
char *p;
|
||||||
|
|
||||||
while ((p = (strsep) (&str, ":")) != NULL)
|
while ((p = (strsep) (&str, ":")) != NULL)
|
||||||
if (dso_name_valid_for_suid (p))
|
if (! __glibc_unlikely (__libc_enable_secure) && dso_name_valid_for_suid (p))
|
||||||
{
|
{
|
||||||
/* This is using the local malloc, not the system malloc. The
|
/* This is using the local malloc, not the system malloc. The
|
||||||
memory can never be freed. */
|
memory can never be freed. */
|
||||||
|
|
Loading…
Reference in New Issue