All of lore.kernel.org
 help / color / mirror / Atom feed
From: Greg KH <gregkh@linuxfoundation.org>
To: "Schmauss, Erik" <erik.schmauss@intel.com>
Cc: Mark Salyzyn <salyzyn@android.com>,
	"Moore, Robert" <robert.moore@intel.com>,
	stable <stable@vger.kernel.org>,
	Seunghun Han <kkamagui@gmail.com>,
	"Wysocki, Rafael J" <rafael.j.wysocki@intel.com>,
	kernel-team <kernel-team@android.com>
Subject: Re: ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c
Date: Fri, 11 May 2018 07:23:55 +0200	[thread overview]
Message-ID: <20180511052355.GA2902@kroah.com> (raw)
In-Reply-To: <CF6A88132359CE47947DB4C6E1709ED539DB20B0@ORSMSX110.amr.corp.intel.com>

On Thu, May 10, 2018 at 06:45:42PM +0000, Schmauss, Erik wrote:
> 
> > -----Original Message-----
> > From: Greg KH [mailto:gregkh@linuxfoundation.org]
> > Sent: Wednesday, May 9, 2018 11:55 PM
> > To: Mark Salyzyn <salyzyn@android.com>
> > Cc: stable <stable@vger.kernel.org>; Seunghun Han <kkamagui@gmail.com>;
> > Schmauss, Erik <erik.schmauss@intel.com>; Wysocki, Rafael J
> > <rafael.j.wysocki@intel.com>; kernel-team <kernel-team@android.com>
> > Subject: Re: ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c
> > 
> > On Wed, May 09, 2018 at 02:30:14PM -0700, Mark Salyzyn wrote:
> > > ToT commit 97f3c0a4b0579b646b6b10ae5a3d59f0441cc12c
> > 
> > "ToT"?  What does that mean?
> > 
> > >
> > > (ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c)
> > >
> > > was assigned CVE-2017-13695
> > > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13695
> > > and has been public since August 25 2017
> > >
> > > Please apply to 3.18, 4.4 and 4.9 stable kernels for the reasons
> > > outlined in the body of the patch:
> > >
> > > "This cache leak causes a security threat because an old kernel (<=
> > > 4.9) shows memory locations of kernel functions in stack dump. Some
> > > malicious users could use this information to neutralize kernel ASLR."
> > >
> > > Bonus Points: Since the patch is ToT upstream, relieving the bug that
> > > results in the memory leak, even despite the non-CVE security status
> > > for
> > > <=4.12 kernels, it may be advised to also include this patch in 4.14.y
> > > stable as well.
> > 
> > Well, I wouldn't apply a patch to just older kernels and not newer ones, that just
> > causes confusion.
> > 
> > But I'm going to push back on this.  The kernel security team said something like
> > "this is crazy, if you control ACPI tables you have bigger problems" when this bug
> > was reported and told the developer to just submit this as a normal code
> > cleanup.
> > 
> > Granting this a CVE was, in my opinion, a total mistake as well.  This doesn't fix
> > any "real" problem that anyone can hit in the wild from what I can tell.  And
> > again, if you can modify ACPI tables, there are much bigger problems you can
> > cause on the hardware.
> 
> Agreed. Could we somehow close this CVE?

Please do, you can submit a request for it to be rejected on the main
CVE site somewhere.  I've done it once in the past.

> > Because of this, why would you need/want this in the stable kernel releases?  It
> > doesn't fix any real bug, only a theoretical one, right?
> 
> The AML would need to be carefully crafted. So yes, this could happen in theory.
> 
> > 
> > ACPI developers, do you think this should be backported?
> 
> One reason to backport this patch is that it performs memory reclamation for
> certain code paths. So no, not necessary but it might be a nice-to-have.

Nice to have for what?  If the AML is correct (as all devices have), all
should be fine, right?

thanks,

greg k-h

  reply	other threads:[~2018-05-11  5:24 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-05-09 21:30 ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c Mark Salyzyn
2018-05-10  6:55 ` Greg KH
2018-05-10 18:45   ` Schmauss, Erik
2018-05-11  5:23     ` Greg KH [this message]
2018-05-15 17:36       ` Schmauss, Erik
2018-05-15 20:42         ` Mark Salyzyn

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20180511052355.GA2902@kroah.com \
    --to=gregkh@linuxfoundation.org \
    --cc=erik.schmauss@intel.com \
    --cc=kernel-team@android.com \
    --cc=kkamagui@gmail.com \
    --cc=rafael.j.wysocki@intel.com \
    --cc=robert.moore@intel.com \
    --cc=salyzyn@android.com \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.