oss-sec mailing list archives

Linux kernel address leaks


From: Solar Designer <solar () openwall com>
Date: Thu, 18 Apr 2019 19:00:58 +0200

Hi,

Fuqian just sent us all 13 of these in 2 days, and I guess there might
be many more to come.  Do we really want to see them in here?  And in
that many individual messages?  I doubt it - but not enough to have used
my moderator powers to outright reject the messages without discussion.

This in part depends on upstream Linux kernel's policy as to kernel
address leaks.  Are those treated as vulnerabilities or as not yet fully
completed kernel hardening effort?  I think it's the latter, in which
case such reports are better sent to the kernel-hardening mailing list.

Also, what's the current approach at dealing with them?  I haven't been
keeping track of that.  Is the kptr_restrict sysctl possibly supposed to
be sufficient, and %p format specifiers can stay intact?  If so, are
those many individual findings by Fuqian actually non-issues?

A proposed patch is generally better than a mere problem report, so if
the issues do need individual fixes, then:

I think these issues should be grouped by subsystem (one message per
subsystem) and sent in the form of proposed patches (fixing the issues
how exactly? need to discuss that first) to LKML and to proper
per-subsystem lists and addresses (per the MAINTAINERS file), CC'ing
kernel-hardening.

I'd appreciate it if someone currently involved in dealing with similar
issues comments on this in a reply-to-all to this message.

Thanks,

Alexander

On Tue, Apr 16, 2019 at 10:08:10AM +0800, Fuqian Huang wrote:
In ascot2e_attach, dev_info will print the address of adapter to
dmesg, sensitive kernel information will be leaked to user space.
struct dvb_frontend *ascot2e_attach(struct dvb_frontend *fe,
  const struct ascot2e_config *config,
  struct i2c_adapter *i2c)
{
  ...
  dev_info(&priv->i2c->dev,
  "Sony ASCOT2E attached on addr=%x at I2C adapter %p\n",
  priv->i2c_address, priv->i2c);
  ...
}


Current thread: