Re: SELinux policy regarding LD_LIBRARY_PATH

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> However, the behavior you are seeing might not be related to SELinux, as
> Linux also enables AT_SECURE if the uid or gid changes across execve (to
> be precise, if the effective identity is not equal to the real identity
> after the credential change, as this was the legacy logic from libc).

So if I understand correctly, SELinux expands on AT_SECURE to sanitize
environment variables across context changes instead of just
setgid/setuid. Makes sense; you live and learn.

In this case I believe it was SELinux performing the sanitization as
disabling it solved the problem, but this is helpful to know.

/Aaron

Attachment: signature.asc
Description: OpenPGP digital signature


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux