diff options
author | 2021-08-09 20:17:34 +0530 | |
---|---|---|
committer | 2021-08-18 02:14:00 +0200 | |
commit | 34ff99d3d9e1d75465dc37b12afd5543f3c8b39b (patch) | |
tree | 035631d00234731b1519b615ef71d7e5d4d02157 | |
parent | Linux: Fix fcntl, ioctl, prctl redirects for _TIME_BITS=64 (bug 28182) (diff) | |
download | glibc-34ff99d3d9e1d75465dc37b12afd5543f3c8b39b.tar.gz glibc-34ff99d3d9e1d75465dc37b12afd5543f3c8b39b.tar.bz2 glibc-34ff99d3d9e1d75465dc37b12afd5543f3c8b39b.zip |
librt: fix NULL pointer dereference (bug 28213)
Helper thread frees copied attribute on NOTIFY_REMOVED message
received from the OS kernel. Unfortunately, it fails to check whether
copied attribute actually exists (data.attr != NULL). This worked
earlier because free() checks passed pointer before actually
attempting to release corresponding memory. But
__pthread_attr_destroy assumes pointer is not NULL.
So passing NULL pointer to __pthread_attr_destroy will result in
segmentation fault. This scenario is possible if
notification->sigev_notify_attributes == NULL (which means default
thread attributes should be used).
Signed-off-by: Nikita Popov <npv1310@gmail.com>
Reviewed-by: Siddhesh Poyarekar <siddhesh@sourceware.org>
(cherry picked from commit b805aebd42364fe696e417808a700fdb9800c9e8)
(cherry picked from commit 79474303223c5665bec75ffbdb2a86ee04a2514b)
-rw-r--r-- | sysdeps/unix/sysv/linux/mq_notify.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/sysdeps/unix/sysv/linux/mq_notify.c b/sysdeps/unix/sysv/linux/mq_notify.c index 9799dcdaa4..eccae2e4c6 100644 --- a/sysdeps/unix/sysv/linux/mq_notify.c +++ b/sysdeps/unix/sysv/linux/mq_notify.c @@ -131,7 +131,7 @@ helper_thread (void *arg) to wait until it is done with it. */ (void) __pthread_barrier_wait (¬ify_barrier); } - else if (data.raw[NOTIFY_COOKIE_LEN - 1] == NOTIFY_REMOVED) + else if (data.raw[NOTIFY_COOKIE_LEN - 1] == NOTIFY_REMOVED && data.attr != NULL) { /* The only state we keep is the copy of the thread attributes. */ __pthread_attr_destroy (data.attr); |