[Bug dynamic-link/31686] Stack-based buffer overflow in parse_tunables_string
adhemerval.zanella at linaro dot org
sourceware-bugzilla@sourceware.org
Wed May 1 14:07:01 GMT 2024
https://sourceware.org/bugzilla/show_bug.cgi?id=31686
--- Comment #2 from Adhemerval Zanella <adhemerval.zanella at linaro dot org> ---
(In reply to Florian Weimer from comment #1)
> Is this a security vulnerability? Not anymore, I presume, because we assume
> GLIBC_TUNABLES is trusted, and no trust boundary is crossed?
Siddhesh and I discussed this with the reporter and we decided that since this
is a local-only bug without a possibility of a real privilege escalation
(GLIBC_TUNABLES parsing is skipped for secure process), we did not allocate a
CVE for this one.
The reporter provided a POC that relies on some weak hardening guarantee
(executable stacks) to bypass a restricted shell, but I am not sure if this is
a viable security issue.
--
You are receiving this mail because:
You are on the CC list for the bug.
More information about the Glibc-bugs
mailing list