netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: David Miller <davem@davemloft.net>
To: adobriyan@gmail.com
Cc: shemminger@vyatta.com, netdev@vger.kernel.org
Subject: Re: [PATCH 4/10] Fix leaking of kernel heap addresses in net/
Date: Fri, 12 Nov 2010 12:37:38 -0800 (PST)	[thread overview]
Message-ID: <20101112.123738.179940542.davem@davemloft.net> (raw)
In-Reply-To: <20101112201850.GA5625@core2.telecom.by>

From: Alexey Dobriyan <adobriyan@gmail.com>
Date: Fri, 12 Nov 2010 22:18:50 +0200

> On Fri, Nov 12, 2010 at 08:33:15AM -0800, Stephen Hemminger wrote:
>> Also, the whole idea needs to be under a config option, so only
>> the paranoid idiots turn it on.
> 
> Would be fun if something will break because ffff8800bcd498c0
> will become something else. :-)

Actually, this is not even a joke.

Take a look at how we track what sockets a user wants dumped via
the inet_diag netlink facility, the socket pointer is used as
the identification cookie.

I'm sure we'll now get some more security theatre about how we
have to undo that too.

More and more I see this whole idea as extremely rediculious.

If I can write to or read kernel memory, I can look up the
sockets, inodes, and whatever else we're currently exposing
the addresses of.  Even without a symbol table, which is
readily available, I can easily find the ksymtab and find the
inode and socket hash table addresses there.

This whole exercise is closing the barn door after the horses have
already escaped, and it's causing all kinds of inconveniences
that we really have no need for.

  reply	other threads:[~2010-11-12 20:37 UTC|newest]

Thread overview: 20+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-11-12  2:15 [PATCH 4/10] Fix leaking of kernel heap addresses in net/ Dan Rosenberg
     [not found] ` <2129857903-1289528127-cardhu_decombobulator_blackberry.rim.net-1506931048--JnVBb1XAImjjL2gL5RxOEzYg3SYOavFBmZ6FRVpaDsI@public.gmane.org>
2010-11-12  2:29   ` David Miller
2010-11-12  2:34     ` Dan Rosenberg
2010-11-12  2:49       ` David Miller
2010-11-12  2:51         ` Dan Rosenberg
2010-11-12  2:59           ` David Miller
2010-11-12  7:23       ` Eric Dumazet
2010-11-12 12:37         ` Dan Rosenberg
2010-11-12 16:33         ` Stephen Hemminger
2010-11-12 17:24           ` Dan Rosenberg
2010-11-12 18:33             ` Stephen Hemminger
2010-11-12 20:18           ` Alexey Dobriyan
2010-11-12 20:37             ` David Miller [this message]
2010-11-12 22:40               ` Alexey Dobriyan
2010-11-12 22:46                 ` David Miller
     [not found] <1289673008.3090.350.camel@Dan>
2010-11-13 18:42 ` Dan Rosenberg
  -- strict thread matches above, loose matches on Subject: below --
2010-11-12  1:07 Dan Rosenberg
2010-11-12  1:10 ` David Miller
2010-11-12  1:20   ` Dan Rosenberg
2010-11-12  2:02     ` David Miller

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20101112.123738.179940542.davem@davemloft.net \
    --to=davem@davemloft.net \
    --cc=adobriyan@gmail.com \
    --cc=netdev@vger.kernel.org \
    --cc=shemminger@vyatta.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).