From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Subject: Re: [PATCH] fix infoleak in fcntl To: Kangjie Lu References: Cc: Jeff Layton , Bruce Fields , Al Viro , linux-fsdevel , LKML , Taesoo Kim , Insu Yun , Kangjie Lu From: Richard Weinberger Message-ID: <572FA936.30802@nod.at> Date: Sun, 8 May 2016 23:01:42 +0200 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org List-ID: Am 08.05.2016 um 17:40 schrieb Kangjie Lu: > > > On Sun, May 8, 2016 at 8:58 AM, Richard Weinberger > wrote: > > On Tue, May 3, 2016 at 10:34 PM, Kangjie Lu > wrote: > > The stack object “si” has a total size of 128 bytes; however, only > > 16 bytes are initialized. The remaining uninitialized bytes are > > sent to userland via send_signal. > > How did you find all these leaks? > Since you sent more than one patch I guess you used some tool, which one? > > > Yes. Since there are *so many* infoleak vulnerabilities in the kernel, we are writing a > static checker to find them. We plan to release it once it is done, so people can use > it to find more bugs in kernel or even other user space programs. How does your tool work? I'd guess it tries to find uninitialized structs passed into copy_to_user(). Thanks, //richard