[Mesa-dev] [Bug 81992] New: mapi_stub->name points to caller memory leads heap-use-after-free bug

bugzilla-daemon at freedesktop.org bugzilla-daemon at freedesktop.org
Thu Jul 31 22:46:28 PDT 2014


https://bugs.freedesktop.org/show_bug.cgi?id=81992

          Priority: medium
            Bug ID: 81992
          Assignee: mesa-dev at lists.freedesktop.org
           Summary: mapi_stub->name points to caller memory leads
                    heap-use-after-free bug
          Severity: normal
    Classification: Unclassified
                OS: All
          Reporter: comicfans44 at gmail.com
          Hardware: Other
            Status: NEW
           Version: git
         Component: GLX
           Product: Mesa

seems that mapi_stub->name just reference the caller memory instead of copy it.

code path:
glXGetProcessARB -> 
_glapi_get_proc_address->
_glapi_get_stub->
stub_find_dynamic->
stub_add_dynamic->

   stub->name = (const void *) name; -->reference the caller memory

when stub_find_dynamic at 

   for (i = 0; i < count; i++) {
      if (strcmp(name, (const char *) dynamic_stubs[i].name) == 0) { 
--->access caller memory
         stub = &dynamic_stubs[i];
         break;
      }
   }

if extension name is allocated at runtime and freed by caller,this bug fired:



    char *p=(char *)malloc(24);

    p[23]='\0';

    strcpy(p,"glFramebufferTextureEXT");

    glXGetProcAddressARB((unsigned char*)p);

    free(p);

    glXGetProcAddressARB((unsigned char*)"glFramebufferTextureEXT");

clang reports here:

==2640==ERROR: AddressSanitizer: heap-use-after-free on address 0x60300000c3a2
at pc 0x000000424971 bp 0x7fff00068ab0 sp 0x7fff00068268
READ of size 1 at 0x60300000c3a2 thread T0
    #0 0x424970 in strcmp
/run/media/wangxinyu/ubuntu-12-root/home/wangxinyu/llvmgit/clang_fedora/../projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:172
    #1 0x31f4e1225f in stub_find_dynamic (/lib64/libglapi.so.0+0x31f4e1225f)
    #2 0x31f4e120cd in _glapi_get_proc_address
(/lib64/libglapi.so.0+0x31f4e120cd)
    #3 0x31f5e1a718 in glXGetProcAddress (/lib64/libGL.so.1+0x31f5e1a718)
    #4 0x4a0906 in initialize() (/home/wangxinyu/glut/a.out+0x4a0906)
    #5 0x4a0f9c in main (/home/wangxinyu/glut/a.out+0x4a0f9c)

0x60300000c3a2 is located 2 bytes inside of 24-byte region
[0x60300000c3a0,0x60300000c3b8)
freed by thread T0 here:
    #0 0x48323b in free
/run/media/wangxinyu/ubuntu-12-root/home/wangxinyu/llvmgit/clang_fedora/../projects/compiler-rt/lib/asan/asan_malloc_linux.cc:30
    #1 0x4a08f7 in initialize() (/home/wangxinyu/glut/a.out+0x4a08f7)
    #2 0x4a0f9c in main (/home/wangxinyu/glut/a.out+0x4a0f9c)


previously allocated by thread T0 here:
    #0 0x4834bb in __interceptor_malloc
/run/media/wangxinyu/ubuntu-12-root/home/wangxinyu/llvmgit/clang_fedora/../projects/compiler-rt/lib/asan/asan_malloc_linux.cc:40
    #1 0x4a078b in initialize() (/home/wangxinyu/glut/a.out+0x4a078b)
    #2 0x4a0f9c in main (/home/wangxinyu/glut/a.out+0x4a0f9c)
    #3 0x31e9621d64 in __libc_start_main (/lib64/libc.so.6+0x31e9621d64)

SUMMARY: AddressSanitizer: heap-use-after-free
/run/media/wangxinyu/ubuntu-12-root/home/wangxinyu/llvmgit/clang_fedora/../projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:172
strcmp
Shadow bytes around the buggy address:
  0x0c067fff9820: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c067fff9830: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c067fff9840: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c067fff9850: fa fa fa fa fa fa 00 00 00 06 fa fa 00 00 00 05
  0x0c067fff9860: fa fa 00 00 00 07 fa fa 00 00 00 07 fa fa 00 00
=>0x0c067fff9870: 06 fa fa fa[fd]fd fd fa fa fa fd fd fd fd fa fa
  0x0c067fff9880: fd fd fd fa fa fa 00 00 00 fa fa fa fd fd fd fd
  0x0c067fff9890: fa fa fd fd fd fa fa fa 00 00 00 00 fa fa fd fd
  0x0c067fff98a0: fd fd fa fa fd fd fd fa fa fa fd fd fd fd fa fa
  0x0c067fff98b0: fd fd fd fa fa fa 00 00 00 fa fa fa fd fd fd fd
  0x0c067fff98c0: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:       fa
  Heap right redzone:      fb
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack partial redzone:   f4
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  ASan internal:           fe
==2640==ABORTING

-- 
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freedesktop.org/archives/mesa-dev/attachments/20140801/0e7d86e3/attachment.html>


More information about the mesa-dev mailing list