Get the latest tech news
AT_EXECVE_CHECK Submitted For Linux 6.14 To Help With Consistent Security
In anticipation of the Linux 6.14 merge window opening next week if Linux 6.13 releases as expected this coming Sunday, Google engineer Kees Cook has already sent out pull requests to Linus Torvalds of new feature code he's been aligning for the v6.14 cycle
AT_EXECVE_CHECK spent the past cycle in "-next" and aims to offer more consistent security on Linux by allowing user-space with a means of "execability" checks for things that aren't executable but don't pass through execve, such as scripts run by an interpreter in user-space or dlopen()'ed libraries. To avoid race conditions leading to time-of-check to time-of-use issues, AT_EXECVE_CHECK should be used with AT_EMPTY_PATH to check against a file descriptor instead of a path." This pull request is now awaiting action by Linus Torvalds once the Linux 6.14 merge window opens for introducing AT_EXECVE_CHECK.
Or read this on Phoronix