stable.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Greg KH <gregkh@linuxfoundation.org>
To: "Schmauss, Erik" <erik.schmauss@intel.com>
Cc: Mark Salyzyn <salyzyn@android.com>,
	"Moore, Robert" <robert.moore@intel.com>,
	stable <stable@vger.kernel.org>,
	Seunghun Han <kkamagui@gmail.com>,
	"Wysocki, Rafael J" <rafael.j.wysocki@intel.com>,
	kernel-team <kernel-team@android.com>
Subject: Re: ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c
Date: Fri, 11 May 2018 07:23:55 +0200	[thread overview]
Message-ID: <20180511052355.GA2902@kroah.com> (raw)
In-Reply-To: <CF6A88132359CE47947DB4C6E1709ED539DB20B0@ORSMSX110.amr.corp.intel.com>

On Thu, May 10, 2018 at 06:45:42PM +0000, Schmauss, Erik wrote:
> 
> > -----Original Message-----
> > From: Greg KH [mailto:gregkh@linuxfoundation.org]
> > Sent: Wednesday, May 9, 2018 11:55 PM
> > To: Mark Salyzyn <salyzyn@android.com>
> > Cc: stable <stable@vger.kernel.org>; Seunghun Han <kkamagui@gmail.com>;
> > Schmauss, Erik <erik.schmauss@intel.com>; Wysocki, Rafael J
> > <rafael.j.wysocki@intel.com>; kernel-team <kernel-team@android.com>
> > Subject: Re: ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c
> > 
> > On Wed, May 09, 2018 at 02:30:14PM -0700, Mark Salyzyn wrote:
> > > ToT commit 97f3c0a4b0579b646b6b10ae5a3d59f0441cc12c
> > 
> > "ToT"?  What does that mean?
> > 
> > >
> > > (ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c)
> > >
> > > was assigned CVE-2017-13695
> > > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13695
> > > and has been public since August 25 2017
> > >
> > > Please apply to 3.18, 4.4 and 4.9 stable kernels for the reasons
> > > outlined in the body of the patch:
> > >
> > > "This cache leak causes a security threat because an old kernel (<=
> > > 4.9) shows memory locations of kernel functions in stack dump. Some
> > > malicious users could use this information to neutralize kernel ASLR."
> > >
> > > Bonus Points: Since the patch is ToT upstream, relieving the bug that
> > > results in the memory leak, even despite the non-CVE security status
> > > for
> > > <=4.12 kernels, it may be advised to also include this patch in 4.14.y
> > > stable as well.
> > 
> > Well, I wouldn't apply a patch to just older kernels and not newer ones, that just
> > causes confusion.
> > 
> > But I'm going to push back on this.  The kernel security team said something like
> > "this is crazy, if you control ACPI tables you have bigger problems" when this bug
> > was reported and told the developer to just submit this as a normal code
> > cleanup.
> > 
> > Granting this a CVE was, in my opinion, a total mistake as well.  This doesn't fix
> > any "real" problem that anyone can hit in the wild from what I can tell.  And
> > again, if you can modify ACPI tables, there are much bigger problems you can
> > cause on the hardware.
> 
> Agreed. Could we somehow close this CVE?

Please do, you can submit a request for it to be rejected on the main
CVE site somewhere.  I've done it once in the past.

> > Because of this, why would you need/want this in the stable kernel releases?  It
> > doesn't fix any real bug, only a theoretical one, right?
> 
> The AML would need to be carefully crafted. So yes, this could happen in theory.
> 
> > 
> > ACPI developers, do you think this should be backported?
> 
> One reason to backport this patch is that it performs memory reclamation for
> certain code paths. So no, not necessary but it might be a nice-to-have.

Nice to have for what?  If the AML is correct (as all devices have), all
should be fine, right?

thanks,

greg k-h

  reply	other threads:[~2018-05-11  5:24 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-05-09 21:30 ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c Mark Salyzyn
2018-05-10  6:55 ` Greg KH
2018-05-10 18:45   ` Schmauss, Erik
2018-05-11  5:23     ` Greg KH [this message]
2018-05-15 17:36       ` Schmauss, Erik
2018-05-15 20:42         ` Mark Salyzyn

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20180511052355.GA2902@kroah.com \
    --to=gregkh@linuxfoundation.org \
    --cc=erik.schmauss@intel.com \
    --cc=kernel-team@android.com \
    --cc=kkamagui@gmail.com \
    --cc=rafael.j.wysocki@intel.com \
    --cc=robert.moore@intel.com \
    --cc=salyzyn@android.com \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).