| Summary: | Sanity check the forward and backward chunk pointers in the unlink() macro | ||
|---|---|---|---|
| Product: | Gentoo Linux | Reporter: | solar (RETIRED) <solar> |
| Component: | [OLD] Core system | Assignee: | Please assign to toolchain <gcc-porting> |
| Status: | RESOLVED FIXED | ||
| Severity: | normal | CC: | hardened, security |
| Priority: | High | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | All | ||
| URL: | http://openwall.com/Owl/CHANGES-1.1.shtml | ||
| Whiteboard: | |||
| Package list: | Runtime testing required: | --- | |
| Attachments: |
glibc-2.3.3_pre20031222.ebuild.diff
glibc-2.3.3-owl-malloc-unlink-sanity-check.diff |
||
|
Description
solar (RETIRED)
2004-01-18 11:55:42 UTC
Created attachment 24033 [details, diff]
glibc-2.3.3_pre20031222.ebuild.diff
Created attachment 24034 [details, diff]
glibc-2.3.3-owl-malloc-unlink-sanity-check.diff
You did see the note in the conclusion about glibc-2.3* ? The Note by the editors? ------------------------------------------------- [ Note by editors: It came to our attention that the described technique might not work for the glibc 2.3 serie. ] ------------------------------------------------- If so I saw it but I've seen no changes in the unlink() macro itself in glibc itself so I assume the editors note is incorrect. My heap is not executable in the first place so I have no easy way to verify if this holds true or not. If you can mail me an exploit to check it, I can verify ... In the end I would end up mailing you link back to http://www.phrack.org/phrack/61/p61-0x06_Advanced_malloc_exploits.txt so I don't think I will provide exploit code or would hopefully need to seeing as this is just a basic sanity check for when glibc free's memory internally. If need be we could email Stefan Esser and ask him for his input on this bug. *** Bug 37763 has been marked as a duplicate of this bug. *** merged in ~arch |