mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2025-01-23 17:52:26 -05:00
c6e552ac8f
It was possible to craft a custom ELF executable that when symbolicated would cause the kernel to read from user-controlled addresses anywhere in memory. You could then fetch this memory via /proc/PID/stack We fix this by making ELFImage hand out StringView rather than raw const char* for symbol names. In case a symbol offset is outside the ELF image, you get a null StringView. :^) Test: Kernel/elf-symbolication-kernel-read-exploit.cpp |
||
---|---|---|
.. | ||
elf-symbolication-kernel-read-exploit.cpp | ||
mmap-write-into-running-programs-executable-file.cpp | ||
null-deref-close-during-select.cpp | ||
null-deref-crash-during-pthread_join.cpp | ||
uaf-close-while-blocked-in-read.cpp |