New submission from Radoslaw Madej <radeg...@o2.pl>:

Hi,

Python ctypes module creates a 'rwx' memory mapping (defined in 
malloc_closure.c) which causes python to crash when running under grsecurity 
enabled kernel and could also have a negative security impact. 

Is there any specific need for the mmap call to create an executable mapping or 
can it be safely removed? 

Please refer here for more information and proposed patch:
http://bugs.gentoo.org/show_bug.cgi?id=329499

The actual mmap call:
item = (ITEM *)mmap(NULL,
                            count * sizeof(ITEM),
                            PROT_READ | PROT_WRITE | PROT_EXEC,
                            MAP_PRIVATE | MAP_ANONYMOUS,
                            -1,
                            0);

There has been further investigation done by Gentoo users and work towards 
python handling this error gracefully rather than segfaulting. It seems that 
dereference at Py_XDECREF(self->restype); (line 23 of 
Modules/_ctypes/callbacks.c) causes the segfault.

Thanks.

----------
assignee: theller
components: ctypes
messages: 111644
nosy: radegand532, theller
priority: normal
severity: normal
status: open
title: python-2.6.5 and 3.2.1 uses 'rwx' mmap() calls for the ctypes module
type: security
versions: Python 2.6, Python 3.2

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue9385>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
http://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to