Received: by 2002:a05:7208:9594:b0:7e:5202:c8b4 with SMTP id gs20csp2501283rbb; Wed, 28 Feb 2024 04:04:28 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCUJTpMcuX9xaTfeqnazFfQxsvSek9peM4lBPTJZqQfN17POVXEyHU+o3GOaMtdVYh8RnkIB+INYaUJBO8LASxx2HSQK6t+eaBNf+4REyw== X-Google-Smtp-Source: AGHT+IFymQzN4wUPQSkMG23iTSc2b6FfMLap52Y9HUyG9eAabNFRGy9X4RBlXdebc9hd3HRtBvfc X-Received: by 2002:a05:620a:530c:b0:785:d95d:dda0 with SMTP id oo12-20020a05620a530c00b00785d95ddda0mr4552956qkn.41.1709121868318; Wed, 28 Feb 2024 04:04:28 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709121868; cv=pass; d=google.com; s=arc-20160816; b=Mi54gqxpC4oC0V7X/IvSoqb5gAMqNmbDfVD2lgGd62kcBggcFO5ao+gpUgZtKHEEE5 I/gdTpnaVtUYcBtizehCrWwpE+YWlSSXNpnhE8p1FN9rR1mBAU9OM7dGOQ5tbWmPetE9 +sVadXQ5ZQ2ioXL6ZJTXAMCVc3UzRgN5LF6TJ5ZcU9YpAfVoe3wpcRLCIudZZOaYdgnG MmUUYk8IdOKwnEFx+IJ347qiMeSwU1juc24w+l+/Mes7xvP/1wBa9D0xDDJcZNvpbpQA 8RXk/eWw80YKTiI64kIkvTeE+H63UKYKbAx20ZqB4LNZ9bIKg3smg/PRtqfZI+PG5ogG rZBg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature:dkim-signature; bh=4pjkTaxzkgu+DE54ztxTNhryxVp6opyUnmdJ9nk8fyY=; fh=GvokS+VdW6gtBYNLjmzFU7qWe3WZf+IH3/z/y6WFs6g=; b=HrYCwAbBd8y/KvcnNfOaLXc7wUa2kEn+YVPq+O0zY0pTdNW1eG+tPSSYcuWWF5413r ilVpZ9pcgEZ44rQos5j6AZ/a/fgvFAEaE3Fho1rjj+5sCz287U6+MNeamWdnkyfR5pYQ hJCxbzEiGuITjgsO77qHGSl/sz36qsBvePXMhjK2T75/hmpt49KxdS0tMWxuwFpTNUJe 7QsOkrJTN8lZyJpfdd6plfrkwgtyh2WYNUVKndtlP3HpDszibmVpyDJibMiqvMvEeLav HCvUOO3kGDiy8oKF9nQKrSbIA2FAaaBimdOTHbr5XBoDH3FIKFb7A6+uASYLdKZi4f63 dV4A==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=msGnkbfw; dkim=pass header.i=@suse.com header.s=susede1 header.b=UDTgWxQH; arc=pass (i=1 spf=pass spfdomain=suse.com dkim=pass dkdomain=suse.com dkim=pass dkdomain=suse.com dmarc=pass fromdomain=suse.com); spf=pass (google.com: domain of linux-kernel+bounces-84990-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-84990-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id h1-20020a05620a13e100b00787b7eec7f3si9436517qkl.703.2024.02.28.04.04.28 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Feb 2024 04:04:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-84990-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=msGnkbfw; dkim=pass header.i=@suse.com header.s=susede1 header.b=UDTgWxQH; arc=pass (i=1 spf=pass spfdomain=suse.com dkim=pass dkdomain=suse.com dkim=pass dkdomain=suse.com dmarc=pass fromdomain=suse.com); spf=pass (google.com: domain of linux-kernel+bounces-84990-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-84990-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 140F21C23EA9 for ; Wed, 28 Feb 2024 12:04:28 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id A77DE73529; Wed, 28 Feb 2024 12:04:21 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=suse.com header.i=@suse.com header.b="msGnkbfw"; dkim=pass (1024-bit key) header.d=suse.com header.i=@suse.com header.b="UDTgWxQH" Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.223.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D672F73501 for ; Wed, 28 Feb 2024 12:04:17 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=195.135.223.130 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709121860; cv=none; b=JZb99jtRJyWWdCWG4eTQCbgb22wZ+mQG5mjt/KADK0XuxQWgjA1rRbhHvlCVvMIDiXoPTEMCP4V9oqLSD3vjLMmKAbCDL4L3oXeprYeFBPtxp5KfC+Qaiejz3+mY2HblmyhInr/YuXwBxHEPprzonVdcdOmsfeQpi4Z1MOFYXYk= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709121860; c=relaxed/simple; bh=jov2Pibp8j5fYySB7FhWN7chymr34ARm/zfn03U14jY=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=VctcKILFmW9qd/FRCxiWKYPP1jcnKv9AlJOHCr61rOyH2+e3p9nesH5cshwXtyxOWsQi7nLAipASUE5dpZIQo09ydoCY8UJVeoNDJPVqt7N4y/xHNQ5s3HgTDX2nAyEwpixCjzcBYN3ga1ORQcKtLEzf4IoBWdAXT7iIMXAYoKY= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=suse.com; spf=pass smtp.mailfrom=suse.com; dkim=pass (1024-bit key) header.d=suse.com header.i=@suse.com header.b=msGnkbfw; dkim=pass (1024-bit key) header.d=suse.com header.i=@suse.com header.b=UDTgWxQH; arc=none smtp.client-ip=195.135.223.130 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=suse.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=suse.com Received: from imap1.dmz-prg2.suse.org (imap1.dmz-prg2.suse.org [IPv6:2a07:de40:b281:104:10:150:64:97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id D1814223DF; Wed, 28 Feb 2024 12:04:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1709121855; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=4pjkTaxzkgu+DE54ztxTNhryxVp6opyUnmdJ9nk8fyY=; b=msGnkbfw8KUUnldAYtKLQAp1eR+taag/zkMPk8su5Q5HmrDJ1j9KPiP6y8ALvStlw8nQXN s+bghodKCOmo7sJx2Xwt8YYUVPaOewBPeFnY6cUADR2y0jcDAAXyCnCiYZ6WFTTisyBdhI bZrNN1ZjZKejkGK7DlGIuk9O6iKjjKg= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1709121854; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=4pjkTaxzkgu+DE54ztxTNhryxVp6opyUnmdJ9nk8fyY=; b=UDTgWxQH8bJe0NuObwxRDEmE4UWd8aiHTnv2rAkqsDsEB/W44klpuDL+Sp5uEjVVfaYCZC 1HwwRfqZsB2TxqrtBTAXY9ywuu6jCZnwSjjRQl9iO1YbpQs06t4T0t0Sryl/YmZM6shjHt UHur+rl1dF2/sXRKZnteuYaubmRSKPQ= Received: from imap1.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id B666813A5D; Wed, 28 Feb 2024 12:04:14 +0000 (UTC) Received: from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167]) by imap1.dmz-prg2.suse.org with ESMTPSA id 3EjwKD4h32X9UAAAD6G6ig (envelope-from ); Wed, 28 Feb 2024 12:04:14 +0000 Date: Wed, 28 Feb 2024 13:04:14 +0100 From: Michal Hocko To: Kees Cook Cc: Greg Kroah-Hartman , cve@kernel.org, linux-kernel@vger.kernel.org Subject: Re: CVE-2023-52451: powerpc/pseries/memhp: Fix access beyond end of drmem array Message-ID: References: <2024022257-CVE-2023-52451-7bdb@gregkh> <2024022639-wronged-grafted-6777@gregkh> <202402271029.FD67395@keescook> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <202402271029.FD67395@keescook> Authentication-Results: smtp-out1.suse.de; dkim=pass header.d=suse.com header.s=susede1 header.b=UDTgWxQH X-Spamd-Result: default: False [-3.81 / 50.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[suse.com:s=susede1]; SPAMHAUS_XBL(0.00)[2a07:de40:b281:104:10:150:64:97:from]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DWL_DNSWL_LOW(-1.00)[suse.com:dkim]; RCVD_COUNT_THREE(0.00)[3]; DKIM_SIGNED(0.00)[suse.com:s=susede1]; DKIM_TRACE(0.00)[suse.com:+]; MX_GOOD(-0.01)[]; DBL_BLOCKED_OPENRESOLVER(0.00)[suse.com:dkim]; FUZZY_BLOCKED(0.00)[rspamd.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; MID_RHS_NOT_FQDN(0.50)[]; RCVD_TLS_ALL(0.00)[]; BAYES_HAM(-3.00)[100.00%] X-Rspamd-Server: rspamd1.dmz-prg2.suse.org X-Rspamd-Queue-Id: D1814223DF X-Spam-Level: X-Spam-Score: -3.81 X-Spam-Flag: NO On Tue 27-02-24 10:35:40, Kees Cook wrote: > On Mon, Feb 26, 2024 at 04:25:09PM +0100, Michal Hocko wrote: [...] > > Does that mean that any potentially incorrect input provided by an admin is > > considered CVE now? > > Yes. Have you seen what USER_NS does? There isn't a way to know how > deployments are using Linux, and this is clearly a "weakness" as defined > by CVE. It is better to be over zealous than miss things. If we are over zealous to the point when almost any fix is marked CVE then the special marking simply stops making any sense IMHO. > > I guess we would need to ban interfaces like /dev/mem and many others. > > Yes. Absolutely. :) Have you seen CONFIG_STRICT_DEVMEM, > CONFIG_IO_STRICT_DEVMEM, etc? Many deployments keep a bright line > between root and kernel. There is a whole subsystem (lockdown) for > working to enforce this. Are you confusing hardening with security relevant fixes here? It makes a lot of sense to reduce the attack space by sacrificing functionality for some usecases but in general a large part of the kernel is built around a "root can do anything" philosophy. Whether we like it or not. And that means that we do not even pretend to protect dubious configurations by root/CAP_SYSADMIN which could effectivelly DoS the system (just consider hotplug/hotremove as an example - try to run your workload when most CPUs or memory is offlined). Some operations are simply not suited for untrusted entity. [...] > There's no harm in marking fixes for weaknesses as CVEs, so why the > push back? Because assigning CVEs nilly willy was the main downside of the prior process and I was hoping that the new one, in hands of kernel people, could be better and we could be getting more relevant CVEs. -- Michal Hocko SUSE Labs