On Tue, Apr 09, 2019 at 07:58:20AM -0000, Maciej Borzecki wrote: > Proposed tenative fix in snapd is to disable PIE builds. Relevant PR: > https://github.com/snapcore/snapd/pull/6700
I dislike this change. While ASLR is not particularly strong on 32 bit platforms, it is significantly more useful when used with 64 bit platforms. Go itself may be relatively safe from the common mistakes that make ASLR really useful in C, but loading C libraries does happen. Furthermore I'm not confident it will actually help. The problem appears to be that a specific size was requested at a specific location and MAP_FIXED prevents the kernel from finding another region where the requested allocation could fit: mmap2(0x7f900000, 150536192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = -1 ENOMEM (Cannot allocate memory) Removing the MAP_FIXED would probably allow this allocation to continue, albeit at a different location, and would also avoid the caveat given in the mmap(2) manpage: Furthermore, this option is extremely hazardous (when used on its own), because it forcibly removes preexisting mappings, making it easy for a multithreaded process to corrupt its own address space. Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1822738 Title: memleak in 2.38+ ? To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1822738/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs