NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: kern/56673: don't allow execve with NULL argv



The following reply was made to PR kern/56673; it has been noted by GNATS.

From: Jan Schaumann <jschauma%netmeister.org@localhost>
To: Robert Elz <kre%munnari.OZ.AU@localhost>
Cc: Joerg Sonnenberger <joerg%bec.de@localhost>, gnats-bugs%netbsd.org@localhost,
	kern-bug-people%netbsd.org@localhost
Subject: Re: kern/56673: don't allow execve with NULL argv
Date: Mon, 31 Jan 2022 09:11:50 -0500

 Robert Elz <kre%munnari.OZ.AU@localhost> wrote:
 
 > I doubt fixing breakage here would be very hard, finding refs
 > to refs of argv[0] isn't all that difficult.   This also is not
 > urgent, I'm not aware af anything that calls any of the exec()
 > functions without giving a value for argv[0] - is anyone?
 
 Are you asking for calls in base or for _any_ example?
 
 The polkit vulnerabiity (CVE-2021-4034)) that prompted
 me to open this PR is an example.  polkit is available
 via pkgsrc, so conceivably vulnerable on NetBSD
 (although I haven't verified it).
 
 -Jan
 


Home | Main Index | Thread Index | Old Index