36bd371e26
The AT_RANDOM changes broke setuid / setgid executables
such as "ping". When the linker executes a setuid program,
it cleans the environment, removing any invalid environment
entries, and adding "NULL"s to the end of the environment
array for each removed variable. Later on, we try to determine
the location of the aux environment variable, and get tripped
up by these extra NULLs.
Reverting this patch will get setuid executables working again,
but getauxval() is still broken for setuid programs because of
this bug.
This reverts commit
|
||
---|---|---|
.. | ||
Android.mk | ||
benchmark_main.cpp | ||
benchmark.h | ||
dirent_test.cpp | ||
dlfcn_test.cpp | ||
empty.cpp | ||
fenv_test.cpp | ||
getauxval_test.cpp | ||
getcwd_test.cpp | ||
libgen_test.cpp | ||
pthread_test.cpp | ||
regex_test.cpp | ||
signal_test.cpp | ||
stack_protector_test.cpp | ||
stdio_test.cpp | ||
stdlib_test.cpp | ||
string_benchmark.cpp | ||
string_test.cpp | ||
stubs_test.cpp | ||
unistd_test.cpp |