| Index: gcc/libmudflap/mf-runtime.c
|
| diff --git a/gcc/libmudflap/mf-runtime.c b/gcc/libmudflap/mf-runtime.c
|
| index b2c462e52516d08ae19b918988374556464d0bf3..25e49ba9d997554ee6d100f5eb6e29fc82a8c518 100644
|
| --- a/gcc/libmudflap/mf-runtime.c
|
| +++ b/gcc/libmudflap/mf-runtime.c
|
| @@ -303,6 +303,14 @@ __mf_set_default_options ()
|
| #ifdef LIBMUDFLAPTH
|
| __mf_opts.thread_stack = 0;
|
| #endif
|
| +
|
| + /* PR41443: Beware that the above flags will be applied to
|
| + setuid/setgid binaries, and cannot be overriden with
|
| + $MUDFLAP_OPTIONS. So the defaults must be non-exploitable.
|
| +
|
| + Should we consider making the default violation_mode something
|
| + harsher than viol_nop? OTOH, glibc's MALLOC_CHECK_ is disabled
|
| + by default for these same programs. */
|
| }
|
|
|
| static struct mudoption
|
| @@ -442,7 +450,7 @@ __mf_usage ()
|
| "This is a %s%sGCC \"mudflap\" memory-checked binary.\n"
|
| "Mudflap is Copyright (C) 2002-2010 Free Software Foundation, Inc.\n"
|
| "\n"
|
| - "The mudflap code can be controlled by an environment variable:\n"
|
| + "Unless setuid, a program's mudflap options be set by an environment variable:\n"
|
| "\n"
|
| "$ export MUDFLAP_OPTIONS='<options>'\n"
|
| "$ <mudflapped_program>\n"
|
| @@ -695,6 +703,12 @@ __mf_init ()
|
| if (LIKELY (__mf_starting_p == 0))
|
| return;
|
|
|
| +#if defined(__FreeBSD__) && defined(LIBMUDFLAPTH)
|
| + pthread_self();
|
| + LOCKTH ();
|
| + UNLOCKTH ();
|
| +#endif /* Prime mutex which calls calloc upon first lock to avoid deadlock. */
|
| +
|
| /* This initial bootstrap phase requires that __mf_starting_p = 1. */
|
| #ifdef PIC
|
| __mf_resolve_dynamics ();
|
| @@ -705,7 +719,8 @@ __mf_init ()
|
|
|
| __mf_set_default_options ();
|
|
|
| - ov = getenv ("MUDFLAP_OPTIONS");
|
| + if (getuid () == geteuid () && getgid () == getegid ()) /* PR41433, not setuid */
|
| + ov = getenv ("MUDFLAP_OPTIONS");
|
| if (ov)
|
| {
|
| int rc = __mfu_set_options (ov);
|
|
|