Just to state the obvious, the LD_PRELOAD risk does not go away when you don’t 
use the feature. I think this scan result should be ignored (at best). It is 
more a weakness of the Linux bintools/ld and not your extension.

(In normal usage there is no risk as an attacker who can modify the environment 
variable of a user also can execute malicious code directly, however there have 
been problems with environment variable handling in su, cgi and sshd in the 
past, so it might be worth not forgetting about it)

Gruss
Bernd
--
http://bernd.eckenfels.net

________________________________
Von: security-dev <security-dev-boun...@openjdk.java.net> im Auftrag von 
Christian Heinrich <christian.heinr...@cmlh.id.au>
Gesendet: Dienstag, April 16, 2019 2:55 AM
An: Hank Edwards
Cc: security-dev@openjdk.java.net
Betreff: Re: JNI Signal Chaining and OWASP (Security)

Hank,

On Fri, 12 Apr 2019 at 09:41, Hank Edwards <hedwa...@crawfordtech.com> wrote:
>We've recently discovered that the use of C is considered a code injection 
>risk by security analysis tools, such as ones that check for OWASP 2017.

I contribute to https://github.com/OWASP/Top10/pull/450

Can you please disclose the specific candidate[s] your security
analysis tool has cited within the OWASP Top Ten 2017 release?


--
Regards,
Christian Heinrich

http://cmlh.id.au/contact

Reply via email to