mirror of
https://sourceware.org/git/glibc.git
synced 2025-07-30 22:43:12 +03:00
The 7bb8045ec0
path made the '%n' fortify check ignore EMFILE errors
while trying to open /proc/self/maps, and this added a security
issue where EMFILE can be attacker-controlled thus making it
ineffective for some cases.
The EMFILE failure is reinstated but with a different error
message. Also, to improve the false positive of the hardening for
the cases where no new files can be opened, the
_dl_readonly_area now uses _dl_find_object to check if the
memory area is within a writable ELF segment. The procfs method is
still used as fallback.
Checked on x86_64-linux-gnu and i686-linux-gnu.
Reviewed-by: Arjun Shankar <arjun@redhat.com>
54 lines
1.7 KiB
C
54 lines
1.7 KiB
C
/* Test if a memory region is wholly unwritable. Mach version.
|
|
Copyright (C) 2004-2025 Free Software Foundation, Inc.
|
|
This file is part of the GNU C Library.
|
|
|
|
The GNU C Library is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Lesser General Public
|
|
License as published by the Free Software Foundation; either
|
|
version 2.1 of the License, or (at your option) any later version.
|
|
|
|
The GNU C Library is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public
|
|
License along with the GNU C Library; if not, see
|
|
<https://www.gnu.org/licenses/>. */
|
|
|
|
#include <stdlib.h>
|
|
#include <stdint.h>
|
|
#include <mach.h>
|
|
|
|
enum readonly_error_type
|
|
__readonly_area_fallback (const void *ptr, size_t size)
|
|
{
|
|
vm_address_t region_address = (uintptr_t) ptr;
|
|
vm_size_t region_length = size;
|
|
vm_prot_t protection;
|
|
vm_prot_t max_protection;
|
|
vm_inherit_t inheritance;
|
|
boolean_t is_shared;
|
|
mach_port_t object_name;
|
|
vm_offset_t offset;
|
|
|
|
while (__vm_region (__mach_task_self (),
|
|
®ion_address, ®ion_length,
|
|
&protection, &max_protection, &inheritance, &is_shared,
|
|
&object_name, &offset) == KERN_SUCCESS
|
|
&& region_address <= (uintptr_t) ptr)
|
|
{
|
|
region_address += region_length;
|
|
if (region_address < (uintptr_t) ptr)
|
|
continue;
|
|
|
|
if (protection & VM_PROT_WRITE)
|
|
return readonly_area_writable;
|
|
|
|
if (region_address - (uintptr_t) ptr >= size)
|
|
break;
|
|
}
|
|
|
|
return readonly_noerror;
|
|
}
|