aboutsummaryrefslogtreecommitdiff
path: root/include
diff options
context:
space:
mode:
Diffstat (limited to 'include')
-rw-r--r--include/ssp/stdio.h37
1 files changed, 36 insertions, 1 deletions
diff --git a/include/ssp/stdio.h b/include/ssp/stdio.h
index 630683951e4b..73c601c408ce 100644
--- a/include/ssp/stdio.h
+++ b/include/ssp/stdio.h
@@ -36,6 +36,10 @@
#include <ssp/ssp.h>
+#if __SSP_FORTIFY_LEVEL > 0 && __EXT1_VISIBLE
+#include <sys/stdint.h>
+#endif
+
__BEGIN_DECLS
#if __SSP_FORTIFY_LEVEL > 0
#if __POSIX_VISIBLE
@@ -51,7 +55,38 @@ __ssp_redirect(size_t, fread, (void *__restrict __buf, size_t __len,
__ssp_redirect(size_t, fread_unlocked, (void *__restrict __buf, size_t __len,
size_t __nmemb, FILE *__restrict __fp), (__buf, __len, __nmemb, __fp));
#if __EXT1_VISIBLE
-__ssp_redirect(char *, gets_s, (char *__buf, rsize_t __len), (__buf, __len));
+__ssp_redirect_raw_impl(char *, gets_s, gets_s,
+ (char *buf, rsize_t len))
+{
+ char *retbuf;
+ size_t bufsz;
+ int need_fail = 0;
+
+ /*
+ * If we would have overwritten our buffer, we want to fail the check
+ * only if these arguments wouldn't have triggered a constraint
+ * violation.
+ */
+ bufsz = __ssp_bos(buf);
+ if (bufsz != (size_t)-1 && (size_t)len > bufsz) {
+ if (len <= RSIZE_MAX)
+ __chk_fail();
+ need_fail = 1;
+ }
+
+ retbuf = __ssp_real(gets_s)(buf, len);
+
+ /*
+ * If the implementation did *not* handle the case correctly, then
+ * there's a risk that they could have corrupted us into not failing
+ * here. We have tests that cover this, so we'll just count on finding
+ * a broken implementation early on in a less hostile environmnt.
+ */
+ if (need_fail && retbuf != NULL)
+ __chk_fail();
+ return (retbuf);
+}
+
#endif /* __EXT1_VISIBLE */
__ssp_redirect_raw(char *, tmpnam, tmpnam, (char *__buf), (__buf), 1,
__ssp_bos, L_tmpnam);