Skip to content

Fix known security issues in Shiva #9

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
elfmaster opened this issue Apr 12, 2023 · 0 comments
Open

Fix known security issues in Shiva #9

elfmaster opened this issue Apr 12, 2023 · 0 comments
Assignees
Labels
bug Something isn't working

Comments

@elfmaster
Copy link
Contributor

  1. Remove the global reference to context. Currently we have: struct shiva_ctx *ctx_global defined as a global initialized variable in shiva.c. This global variable is predictable in the AARCH64 version because our Interpreter is an ET_EXEC (vs. PIE ET_DYN). This means that an attacker who's exploiting a memory corruption vulnerability could use this as leak to determine the ASLR space or gain access to other read/write primitives.

(Will add more to the list)

@elfmaster elfmaster self-assigned this Apr 12, 2023
@elfmaster elfmaster added the bug Something isn't working label Jun 25, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

1 participant