From: Lee Jones <lee@kernel.org>
To: Luis Chamberlain <mcgrof@kernel.org>
Cc: Michal Hocko <mhocko@suse.com>,
cve@kernel.org, linux-kernel@vger.kernel.org,
Joel Granados <j.granados@samsung.com>,
Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Subject: Re: CVE-2023-52596: sysctl: Fix out of bounds access for empty sysctl registers
Date: Tue, 12 Mar 2024 15:49:10 +0000 [thread overview]
Message-ID: <20240312154910.GC1522089@google.com> (raw)
In-Reply-To: <ZfBwuDyzLl5M0mhC@bombadil.infradead.org>
On Tue, 12 Mar 2024, Luis Chamberlain wrote:
> On Tue, Mar 12, 2024 at 10:45:28AM +0100, Michal Hocko wrote:
> > On Tue 12-03-24 09:17:30, Lee Jones wrote:
> > [...]
> > > > Backporting this is fine, but wouldn't fix an issue unless an external
> > > > module had empty sysctls. And exploiting this is not possible unless
> > > > you purposely build an external module which could end up with empty
> > > > sysctls.
> >
> > Thanks for the clarification Luis!
> >
> > > Thanks for the amazing explanation Luis.
> > >
> > > If I'm reading this correctly, an issue does exist, but an attacker
> > > would have to lay some foundations before it could be triggered. Sounds
> > > like loading of a malicious or naive module would be enough.
> >
> > If the bar is set as high as a kernel module to create and empty sysctl
> > directory then I think it is safe to say that the security aspect is
> > mostly moot. There are much simpler ways to attack the system if you are
> > able to load a kernel module.
>
> Indeed, a simple BUG_ON(1) on external modules cannot possible be a
> source of a CVE. And so this becomes BUG_ON(when_sysctl_empty()) where
Issues that are capable of crashing the kernel in any way, including
with WARN() or BUG() are being considered weaknesses and presently get
CVEs.
> when_sysctl_empty() is hypotethical and I think the source of this
> question for CVE. Today's that not at boot time or dynamically with
> any linux kernel sources released, and so its only possible if:
>
> a) As Joel indicated if you backported an empty sysctl array (which
> would be unless you carried all the infrastructure to support it).
>
> b) an external module has an empty sysctl
So what we're discussing here is weather this situation is
_possible_, however unlikely.
You are the maintainer here, so the final decision is yours. If you say
this situation is impossible and the CVE should be revoked, I'll go
ahead and do just that.
--
Lee Jones [李琼斯]
next prev parent reply other threads:[~2024-03-12 15:49 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <2024030645-CVE-2023-52596-b98e@gregkh>
2024-03-11 8:11 ` CVE-2023-52596: sysctl: Fix out of bounds access for empty sysctl registers Michal Hocko
2024-03-11 21:57 ` Luis Chamberlain
2024-03-12 9:17 ` Lee Jones
2024-03-12 9:45 ` Michal Hocko
2024-03-12 15:11 ` Luis Chamberlain
2024-03-12 15:49 ` Lee Jones [this message]
2024-03-12 18:04 ` Luis Chamberlain
2024-03-12 21:47 ` Kees Cook
2024-03-13 8:01 ` Lee Jones
2024-03-20 18:59 ` Pavel Machek
2024-03-20 15:30 ` Michal Hocko
2024-03-12 11:20 ` Joel Granados
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20240312154910.GC1522089@google.com \
--to=lee@kernel.org \
--cc=cve@kernel.org \
--cc=gregkh@linuxfoundation.org \
--cc=j.granados@samsung.com \
--cc=linux-kernel@vger.kernel.org \
--cc=mcgrof@kernel.org \
--cc=mhocko@suse.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox