Hard disagree
Hard disagree
Posted Jan 26, 2025 12:25 UTC (Sun) by glettieri (subscriber, #15705)In reply to: Hard disagree by intelfx
Parent article: The trouble with the new uretprobes
I may be wrong, but I think you are missing a point here. The protection is against calls coming from outside the injected trampoline (or even from the exact location in the trampoline). But an attacker who has hijacked the control flow in the traced application can make it jump into the trampoline and issue a uretprobe syscall that passes the protection check. Therefore, if there are bugs in the uretprobe implementation, the injected trampoline potentially exposes those bugs to the attacker.
Posted Jan 26, 2025 14:51 UTC (Sun)
by intelfx (subscriber, #130118)
[Link] (1 responses)
I think you are missing mine. How is it different from an application hijacking control flow or whatever to jump to the previous implementation of this mechanism, i.e., a trap instruction? The answer is "it's not", and we were okay with it.
This argument is clearly going in circles, so in order not to incur the wrath of our editors, I will stop participating in this subthread. (However, I must note that this is not equal to conceding.)
Posted Jan 26, 2025 15:35 UTC (Sun)
by glettieri (subscriber, #15705)
[Link]
Good point, I see what you mean now.
Hard disagree
Hard disagree