Bug 1535038 - glibc: Stack canary bypass via pthread_create()
Summary: glibc: Stack canary bypass via pthread_create()
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1535039 1535040 1546606 1546607
Blocks: 1535678
TreeView+ depends on / blocked
 
Reported: 2018-01-16 14:24 UTC by Pedro Sampaio
Modified: 2021-02-17 00:58 UTC (History)
15 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2018-02-26 00:32:37 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Sourceware 22850 0 P3 UNCONFIRMED Harden TCB against stack protector bypass via overwrite of stack_guard 2019-12-12 18:57:43 UTC

Description Pedro Sampaio 2018-01-16 14:24:22 UTC
A flaw in glibc stack protection feature was found. The canary value is located in structure 'tcbhead_t' field 'stack_guard'. If a application create a new thread with pthread_create() function, tcbhead_t structure will be placed on the top of the stack thread, making it vulnerable to corruption a bypass of stack protection.

Comment 13 Doran Moppert 2018-02-19 01:48:27 UTC
Created glibc tracking bugs for this issue:

Affects: fedora-all [bug 1546607]


Created glibc-arm-linux-gnu tracking bugs for this issue:

Affects: fedora-all [bug 1546606]

Comment 14 Doran Moppert 2018-02-19 02:14:17 UTC
Statement:

This flaw is a weakness in -fstack-protector, which is a post-exploitation mitigation of stack buffer overflows. Under specific circumstances, this flaw can allow an attacker to bypass the stack canary. Most often, exploits of this kind are effectively mitigated by FORTIFY_SOURCE, which will detect the attempted overflow before the stack-protector check occurs. The protections offered by FORTITY_SOURCE are not impacted by this flaw.


Note You need to log in before you can comment on or make changes to this bug.