GNU bug report logs -
#63063
CVE-2021-36699 report
Previous Next
Full log
View this message in rfc822 format
> From: Po Lu <luangruo <at> yahoo.com>
> Cc: fuo <at> fuo.fi, 63063 <at> debbugs.gnu.org
> Date: Tue, 25 Apr 2023 16:38:19 +0800
>
> The protection fault is in `dump_do_emacs_relocation'. When the dump
> file contains a relocation with an offset outside the heap:
>
> lv = make_lisp_ptr (obj_ptr, reloc.length);
> memcpy (emacs_ptr_at (reloc.emacs_offset), &lv, sizeof (lv));
>
> will end up copying outside the heap.
Thanks, but that seems to be unrelated to the code to which the OP
pointed. Are you sure it's the same problem?
Also, writing outside of the process's address space will indeed cause
protection fault and SIGSEGV, not a buffer-overflow type of problem
that can be exploited for executing some arbitrary code. So I'm not
sure I see why is this a security issue?
emacs_ptr_at has this comment:
/* TODO: assert somehow that the result is actually in the Emacs
image. */
Can we assure that in some reasonable way? We have valid_pointer_p,
but that's too expensive, I think.
This bug report was last modified 2 years and 56 days ago.
Previous Next
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson.