Linux gets fix for code-execution flaw (Ars Technica)
Linux gets fix for code-execution flaw (Ars Technica)
Posted May 13, 2014 14:23 UTC (Tue) by error27 (subscriber, #8346)In reply to: Linux gets fix for code-execution flaw (Ars Technica) by spender
Parent article: Linux gets fix for code-execution flaw (Ars Technica)
Regarding HIDESYM, if you have kaslr enabled (CONFIG_RANDOMIZE_BASE) then the "download system.map" trick doesn't work.
You keep on calling Kees an idiot whenever he merges a partial solutions but in the end he kept merging parts until he had made a real life improvement to security.
Posted May 13, 2014 16:07 UTC (Tue)
by spender (guest, #23067)
[Link] (3 responses)
and for a generic defeat (doesn't require any vuln, can be done inside heavy seccomp):
spender@www:~$ ls -al kaslr_generic_defeat32.c
Also, I never called Kees an idiot -- I like Kees. I don't like bad security or cargo cult security though, and that's what I've repeatedly pointed out (https://forums.grsecurity.net/viewtopic.php?f=7&t=3367). If we felt KASLR was at all worthwhile, we would have done it ourselves years ago, but it's simply not. With all the information we've put forth so far though and that in academic literature, there could be an argument for labeling as 'stupid' a person who still believes contrary to all available evidence regarding the usefulness of KASLR.
-Brad
Posted May 13, 2014 16:34 UTC (Tue)
by torquay (guest, #92428)
[Link] (2 responses)
Posted May 13, 2014 17:47 UTC (Tue)
by spender (guest, #23067)
[Link]
As for the last question, I imagine they have purchased more than enough exploits already from the rest of the "security industry" (aka exploit mercenaries).
-Brad
Posted May 14, 2014 18:51 UTC (Wed)
by nix (subscriber, #2304)
[Link]
Posted May 13, 2014 17:18 UTC (Tue)
by stock (guest, #5849)
[Link]
Robert
Posted May 13, 2014 18:17 UTC (Tue)
by kees (subscriber, #27264)
[Link] (6 responses)
Posted May 13, 2014 18:42 UTC (Tue)
by spender (guest, #23067)
[Link] (5 responses)
By "work best" you mean "do much of anything at all" which conflicts with their presence and promotion as security features in distributions.
-Brad
Posted May 13, 2014 19:25 UTC (Tue)
by kees (subscriber, #27264)
[Link] (4 responses)
Posted May 13, 2014 20:34 UTC (Tue)
by andresfreund (subscriber, #69562)
[Link]
Well, it's simply not a very clear win on distributions that aren't primarily used for web browsing and light desktop activity. For me the existence of kptr_restrict frequently is a *major* PITA. Part of my job is analyzing bottlenecks on foreign servers. Not having kernel symbols available when profiling *sucks*. So either I have to get root - surely not a gain in security - or kptr_restrict and perf_even_paranoid have to be changed.
Posted May 14, 2014 12:17 UTC (Wed)
by ballombe (subscriber, #9523)
[Link] (2 responses)
Posted May 14, 2014 14:39 UTC (Wed)
by kees (subscriber, #27264)
[Link] (1 responses)
Frequently, upstream mitigation work is more about socializing a solution than creating the actual technical work. Without solid examples of what a mitigation is designed to defend against, it can be hard to convince maintainers of its need.
Posted May 14, 2014 18:31 UTC (Wed)
by ballombe (subscriber, #9523)
[Link]
Linux gets fix for code-execution flaw (Ars Technica)
https://www.youtube.com/watch?v=-Tw_sYmI4LQ
https://www.youtube.com/watch?v=S7BQ7qDz028
https://grsecurity.net/~spender/kaslr.png
Want to guess where the kernel is? ;)
-rw-r--r-- 1 spender spender 2854 Apr 21 00:34 kaslr_generic_defeat32.c
spender@www:~$ ls -al kaslr_generic_defeat64.c
-rw-r--r-- 1 spender spender 2801 Apr 22 19:40 kaslr_generic_defeat64.c
spender@www:~$ sha256sum ./kaslr_generic_defeat32.c
8e394f7511e36ba43469cc4d9961e51e462510d09dba380519c85efbab24ae10 ./kaslr_generic_defeat32.c
spender@www:~$ sha256sum ./kaslr_generic_defeat64.c
b72836de6cf512c59a889dae92e928efecc321c45b00b6bec461e45917f703ae ./kaslr_generic_defeat64.c
Linux gets fix for code-execution flaw (Ars Technica)
https://www.youtube.com/watch?v=-Tw_sYmI4LQ
This is comical and sad at the same time. Care to make the exploits public? Also, why isn't the National Stasi Agency knocking on your door to enhance its 0-day arsenal ?
https://www.youtube.com/watch?v=S7BQ7qDz028
Linux gets fix for code-execution flaw (Ars Technica)
Linux gets fix for code-execution flaw (Ars Technica)
Linux gets fix for code-execution flaw (Ars Technica)
--
Robert M. Stockmann - RHCE
Network Engineer - UNIX/Linux Specialist
crashrecovery.org stock@stokkie.net
Linux gets fix for code-execution flaw (Ars Technica)
Linux gets fix for code-execution flaw (Ars Technica)
Linux gets fix for code-execution flaw (Ars Technica)
Linux gets fix for code-execution flaw (Ars Technica)
Only providing global flags kptr_restrict is too simplistic for the real world.
Linux gets fix for code-execution flaw (Ars Technica)
Linux gets fix for code-execution flaw (Ars Technica)
Linux gets fix for code-execution flaw (Ars Technica)