mirror of
git://sourceware.org/git/glibc.git
synced 2025-02-17 13:00:43 +08:00
elf: Compute correct array size in _dl_init_paths [BZ #22606]
(cherry picked from commit 8a0b17e48b
)
This commit is contained in:
parent
6474863dcb
commit
778a7c1825
@ -1,3 +1,11 @@
|
||||
2017-12-14 Florian Weimer <fweimer@redhat.com>
|
||||
|
||||
[BZ #22606]
|
||||
CVE-2017-1000408
|
||||
* elf/dl-load.c (system_dirs): Update comment.
|
||||
(nsystem_dirs_len): Use array_length.
|
||||
(_dl_init_paths): Use nsystem_dirs_len to compute the array size.
|
||||
|
||||
2017-11-02 Florian Weimer <fweimer@redhat.com>
|
||||
|
||||
Add array_length and array_end macros.
|
||||
|
5
NEWS
5
NEWS
@ -25,6 +25,11 @@ Security related changes:
|
||||
without GLOB_NOESCAPE, could write past the end of a buffer while
|
||||
unescaping user names. Reported by Tim Rühsen.
|
||||
|
||||
CVE-2017-1000408: Incorrect array size computation in _dl_init_paths leads
|
||||
to the allocation of too much memory. (This is not a security bug per se,
|
||||
it is mentioned here only because of the CVE assignment.) Reported by
|
||||
Qualys.
|
||||
|
||||
The following bugs are resolved with this release:
|
||||
|
||||
[20257] sunrpc: clntudp_call does not enforce timeout when receiving data
|
||||
|
@ -37,6 +37,7 @@
|
||||
#include <sysdep.h>
|
||||
#include <stap-probe.h>
|
||||
#include <libc-internal.h>
|
||||
#include <array_length.h>
|
||||
|
||||
#include <dl-dst.h>
|
||||
#include <dl-load.h>
|
||||
@ -103,7 +104,9 @@ static size_t ncapstr attribute_relro;
|
||||
static size_t max_capstrlen attribute_relro;
|
||||
|
||||
|
||||
/* Get the generated information about the trusted directories. */
|
||||
/* Get the generated information about the trusted directories. Use
|
||||
an array of concatenated strings to avoid relocations. See
|
||||
gen-trusted-dirs.awk. */
|
||||
#include "trusted-dirs.h"
|
||||
|
||||
static const char system_dirs[] = SYSTEM_DIRS;
|
||||
@ -111,9 +114,7 @@ static const size_t system_dirs_len[] =
|
||||
{
|
||||
SYSTEM_DIRS_LEN
|
||||
};
|
||||
#define nsystem_dirs_len \
|
||||
(sizeof (system_dirs_len) / sizeof (system_dirs_len[0]))
|
||||
|
||||
#define nsystem_dirs_len array_length (system_dirs_len)
|
||||
|
||||
static bool
|
||||
is_trusted_path (const char *path, size_t len)
|
||||
@ -688,9 +689,8 @@ _dl_init_paths (const char *llp)
|
||||
+ ncapstr * sizeof (enum r_dir_status))
|
||||
/ sizeof (struct r_search_path_elem));
|
||||
|
||||
rtld_search_dirs.dirs[0] = (struct r_search_path_elem *)
|
||||
malloc ((sizeof (system_dirs) / sizeof (system_dirs[0]))
|
||||
* round_size * sizeof (struct r_search_path_elem));
|
||||
rtld_search_dirs.dirs[0] = malloc (nsystem_dirs_len * round_size
|
||||
* sizeof (*rtld_search_dirs.dirs[0]));
|
||||
if (rtld_search_dirs.dirs[0] == NULL)
|
||||
{
|
||||
errstring = N_("cannot create cache for search path");
|
||||
|
Loading…
Reference in New Issue
Block a user