public inbox for glibc-bugs@sourceware.org
help / color / mirror / Atom feed
From: "carlos at redhat dot com" <sourceware-bugzilla@sourceware.org>
To: glibc-bugs@sourceware.org
Subject: [Bug malloc/25945] ASLR information leak via Safe-Linking and tcache or fastbin chunks.
Date: Wed, 13 May 2020 15:22:55 +0000	[thread overview]
Message-ID: <bug-25945-131-GuhDE2zBkA@http.sourceware.org/bugzilla/> (raw)
In-Reply-To: <bug-25945-131@http.sourceware.org/bugzilla/>

https://sourceware.org/bugzilla/show_bug.cgi?id=25945

--- Comment #9 from Carlos O'Donell <carlos at redhat dot com> ---
(In reply to wangxu from comment #7)
> Thanks for patient reply.
> I'm considering whether there's a more blanket solution. Thanks again.
> 
> BTW, is it better to give a change to perturb pointers returned by
> tcache_get(), using alloc_perturb (p, bytes) ?

This is a *distinct* issue. Should M_PERTURB effect tcache? I think it should,
so please file another bug for this.

The issue we are talking about today is the prevention of ASLR bits leaking
from known locations in the chunk metadata. If we can reduce this leakage with
minimal performance loss, because the data is already in the cache and the
write is cheap, then that has value.

I haven't seen any more responses on OSS Security regarding the issue of
allocating a CVE. Our current policy is that "Information disclosure can be
security bugs, especially if exposure through applications can be determined."
and in this case we have no direct exposure through applications that we know
about, so I think allocating a CVE, particularly for an unreleased version of
glibc, is premature.

In which case we should continue working on this as a patch to fix the ASLR
leakage.

Could you please review my comments in
https://sourceware.org/bugzilla/show_bug.cgi?id=25945#c3 and review that we
need to clear the pointers for tcache *and* fastbin?

After such review, please post a patch to libc-alpha for review. It would be
good if you run `make bench` before and after your patch and review the malloc
performance doesn't show any unexpected problems (bench-malloc-simple,
bench-malloc-thread). Likewise confirm no regressions on x86_64.

Thanks.

-- 
You are receiving this mail because:
You are on the CC list for the bug.

  parent reply	other threads:[~2020-05-13 15:22 UTC|newest]

Thread overview: 15+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-05-08  3:35 [Bug malloc/25945] New: memory block return by tcache_get() may contain anather valid memory block pointer, leading to memory leak wangxuszcn at foxmail dot com
2020-05-08  9:51 ` [Bug malloc/25945] " wangxuszcn at foxmail dot com
2020-05-08 12:48 ` [Bug malloc/25945] memory block return by tcache_get() may contain anather valid memory block pointer, leading to information disclosure wangxuszcn at foxmail dot com
2020-05-08 13:03 ` wangxuszcn at foxmail dot com
2020-05-08 16:19 ` carlos at redhat dot com
2020-05-08 16:20 ` [Bug malloc/25945] ASLR information leak via Safe-Linking and tcache or fastbin chunks carlos at redhat dot com
2020-05-08 16:20 ` fweimer at redhat dot com
2020-05-08 16:23 ` fweimer at redhat dot com
2020-05-08 16:44 ` carlos at redhat dot com
2020-05-08 19:18 ` dj at redhat dot com
2020-05-09  3:40 ` wangxuszcn at foxmail dot com
2020-05-09  3:45 ` wangxuszcn at foxmail dot com
2020-05-13 15:22 ` carlos at redhat dot com [this message]
2020-05-15  2:04 ` wangxuszcn at foxmail dot com
2020-05-15  6:44 ` wangxuszcn at foxmail dot com

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=bug-25945-131-GuhDE2zBkA@http.sourceware.org/bugzilla/ \
    --to=sourceware-bugzilla@sourceware.org \
    --cc=glibc-bugs@sourceware.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).