mirror of
https://github.com/RGBCube/serenity
synced 2025-05-31 15:38:10 +00:00
![]() It was possible to craft a custom ELF executable that when symbolicated would cause the kernel to read from user-controlled addresses anywhere in memory. You could then fetch this memory via /proc/PID/stack We fix this by making ELFImage hand out StringView rather than raw const char* for symbol names. In case a symbol offset is outside the ELF image, you get a null StringView. :^) Test: Kernel/elf-symbolication-kernel-read-exploit.cpp |
||
---|---|---|
.. | ||
Arch/i386 | ||
ELFDynamicLoader.cpp | ||
ELFDynamicLoader.h | ||
ELFDynamicObject.cpp | ||
ELFDynamicObject.h | ||
ELFImage.cpp | ||
ELFImage.h | ||
ELFLoader.cpp | ||
ELFLoader.h | ||
exec_elf.h | ||
Makefile |