lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <AANLkTikDeVXcYRXqcq-qD_mf19awnKPTYGZbZguxJLDm@mail.gmail.com> Date: Sun, 7 Nov 2010 15:22:34 -0800 From: Linus Torvalds <torvalds@...ux-foundation.org> To: chas3@...rs.sourceforge.net Cc: Andi Kleen <andi@...stfloor.org>, "Ted Ts'o" <tytso@....edu>, Dan Rosenberg <drosenberg@...curity.com>, "davem@...emloft.net" <davem@...emloft.net>, "kuznet@....inr.ac.ru" <kuznet@....inr.ac.ru>, "pekkas@...core.fi" <pekkas@...core.fi>, "jmorris@...ei.org" <jmorris@...ei.org>, "yoshfuji@...ux-ipv6.org" <yoshfuji@...ux-ipv6.org>, "kaber@...sh.net" <kaber@...sh.net>, "remi.denis-courmont@...ia.com" <remi.denis-courmont@...ia.com>, "netdev@...r.kernel.org" <netdev@...r.kernel.org>, "security@...nel.org" <security@...nel.org> Subject: Re: [Security] [SECURITY] Fix leaking of kernel heap addresses via /proc On Sun, Nov 7, 2010 at 2:48 PM, Chas Williams (CONTRACTOR) <chas@....nrl.navy.mil> wrote: > > i suppose one could use idr to map the pointers to unique values. the > infiniband code uses this technique> We already _have_ the unique value that /proc uses - the inode number. It's what lsof and friends use to match things across different files anyway. Why are people arguing about stupid things? If it's wrong to expose kernel pointers in /proc (and I do think it generally is something we should try to avoid), then we already do have the natural alternative. Which happens to be what the patch already does. So the only question is whether kernel pointers are an information leak worth worrying about. Personally, I think it's just damn stupid to expose a kernel pointer unless you _have_ to. There is absolutely no reason to expose the address of a socket in /proc, perhaps unless you're in some super-duper-debugging mode that no sane person would ever use outside of specialized network debugging (and I bet that in that case you still shouldn't expose it in a _normal_ proc file, but in debugfs or something). Linus -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists