|
Message-ID: <545CB836.6030000@opensource.dyc.edu> Date: Fri, 07 Nov 2014 07:16:54 -0500 From: "Anthony G. Basile" <basile@...nsource.dyc.edu> To: musl@...ts.openwall.com Subject: Re: Re: fixing -fPIE + -fstack-protector-all On 11/06/14 21:10, Andy Lutomirski wrote: > On 11/06/2014 03:45 AM, Anthony G. Basile wrote: >> On 11/05/14 10:43, Rich Felker wrote: >>> On Wed, Nov 05, 2014 at 04:25:03PM +0100, John Spencer wrote: >>>> using -fPIE + -fstack-protector-all is currently broken for a number >>>> of architectures (most notably i386) in the default gcc setup >>>> (including the musl-cross patches), as it depends on a >>>> libssp_nonshared.a which provides __stack_chk_fail_local(). >>> >>> As discussed on IRC, I would _like_ to be able to simply add the >>> following to crt/i386/crti.s: >>> >>> __stack_chk_fail_local: hlt >>> >>> and equivalent for other archs. This has the added benefit of >>> effecting a crash without going through the PLT (whereas >>> libssp_nonshared.a's __stack_chk_fail_local calls __stack_chk_fail via >>> the PLT) so it's not vulnerable to attacks that have overwritten the >>> GOT with malicious pointers. >> >> For what its worth, hardening in gentoo (PaX kernel + userland hardening >> with relro and bindnow) tries to prevent this kind of attack by making >> the GOT read only after initial linking. > > What does the PaX kernel have to do with this? > > --Andy > Overspoke. The userland stuff is sufficient to freeze the GOT. I was just tangentially thinking of PaX's enhanced aslr. -- Anthony G. Basile, Ph. D. Chair of Information Technology D'Youville College Buffalo, NY 14201 (716) 829-8197
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.