mirror of
https://github.com/RGBCube/serenity
synced 2025-07-26 03:27:45 +00:00
LibC: Randomize the stack check cookie value on initialization
Previously we had a static stack check cookie value for LibC. Now we randomize the cookie value on LibC initialization, this should help make the stack check more difficult to attack (still possible just a bigger pain). This should also help to catch more bugs.
This commit is contained in:
parent
9ec9d20e84
commit
fd08c93ef5
2 changed files with 26 additions and 0 deletions
|
@ -33,6 +33,8 @@
|
||||||
|
|
||||||
extern "C" {
|
extern "C" {
|
||||||
|
|
||||||
|
extern u32 __stack_chk_guard;
|
||||||
|
|
||||||
int main(int, char**, char**);
|
int main(int, char**, char**);
|
||||||
|
|
||||||
// Tell the compiler that this may be called from somewhere else.
|
// Tell the compiler that this may be called from somewhere else.
|
||||||
|
@ -40,6 +42,12 @@ int _start(int argc, char** argv, char** env);
|
||||||
|
|
||||||
int _start(int argc, char** argv, char** env)
|
int _start(int argc, char** argv, char** env)
|
||||||
{
|
{
|
||||||
|
u32 original_stack_chk = __stack_chk_guard;
|
||||||
|
arc4random_buf(&__stack_chk_guard, sizeof(__stack_chk_guard));
|
||||||
|
|
||||||
|
if (__stack_chk_guard == 0)
|
||||||
|
__stack_chk_guard = original_stack_chk;
|
||||||
|
|
||||||
environ = env;
|
environ = env;
|
||||||
__environ_is_malloced = false;
|
__environ_is_malloced = false;
|
||||||
|
|
||||||
|
@ -58,6 +66,11 @@ int _start(int argc, char** argv, char** env)
|
||||||
|
|
||||||
exit(status);
|
exit(status);
|
||||||
|
|
||||||
|
// We should never get here, but if we ever do, make sure to
|
||||||
|
// restore the stack guard to the value we entered _start with.
|
||||||
|
// Then we won't trigger the stack canary check on the way out.
|
||||||
|
__stack_chk_guard = original_stack_chk;
|
||||||
|
|
||||||
return 20150614;
|
return 20150614;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -33,6 +33,8 @@
|
||||||
|
|
||||||
extern "C" {
|
extern "C" {
|
||||||
|
|
||||||
|
extern u32 __stack_chk_guard;
|
||||||
|
|
||||||
int main(int, char**, char**);
|
int main(int, char**, char**);
|
||||||
|
|
||||||
extern void __libc_init();
|
extern void __libc_init();
|
||||||
|
@ -43,9 +45,20 @@ extern bool __environ_is_malloced;
|
||||||
int _start(int argc, char** argv, char** env);
|
int _start(int argc, char** argv, char** env);
|
||||||
int _start(int argc, char** argv, char** env)
|
int _start(int argc, char** argv, char** env)
|
||||||
{
|
{
|
||||||
|
u32 original_stack_chk = __stack_chk_guard;
|
||||||
|
arc4random_buf(&__stack_chk_guard, sizeof(__stack_chk_guard));
|
||||||
|
|
||||||
|
if (__stack_chk_guard == 0)
|
||||||
|
__stack_chk_guard = original_stack_chk;
|
||||||
|
|
||||||
_init();
|
_init();
|
||||||
|
|
||||||
int status = main(argc, argv, env);
|
int status = main(argc, argv, env);
|
||||||
|
|
||||||
|
// Restore the stack guard to the value we entered _start with,
|
||||||
|
// so we don't trigger the stack canary check on the way out.
|
||||||
|
__stack_chk_guard = original_stack_chk;
|
||||||
|
|
||||||
return status;
|
return status;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue