From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from simark.ca by simark.ca with LMTP id 6MUbBBtISWUc8j8AWB0awg (envelope-from ) for ; Mon, 06 Nov 2023 15:10:03 -0500 Authentication-Results: simark.ca; dkim=pass (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=G9a1k5XH; dkim-atps=neutral Received: by simark.ca (Postfix, from userid 112) id 0C1331E0BB; Mon, 6 Nov 2023 15:10:03 -0500 (EST) Received: from server2.sourceware.org (server2.sourceware.org [8.43.85.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (prime256v1) server-digest SHA256) (No client certificate requested) by simark.ca (Postfix) with ESMTPS id EC1191E00F for ; Mon, 6 Nov 2023 15:10:00 -0500 (EST) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 5725B3857020 for ; Mon, 6 Nov 2023 20:10:00 +0000 (GMT) Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by sourceware.org (Postfix) with ESMTPS id 557223858C30 for ; Mon, 6 Nov 2023 20:09:48 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 557223858C30 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=redhat.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 557223858C30 Authentication-Results: server2.sourceware.org; arc=none smtp.remote-ip=170.10.133.124 ARC-Seal: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1699301390; cv=none; b=t/yiBwSB9dCO+oVt5peitNoS+NM/KTWFuB96vQA6zrrug+xStG2B+aTyNdommK15GxhvbkIVHbCIRfU/QC3PCAJjDhqfPMZl0O+jMBExsNBZ2htTcLBl7CwUz+wEoK6HObgDjzMia9dgIDukXN3vvgLr+bzdNYs+ajktYgb7IaA= ARC-Message-Signature: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1699301390; c=relaxed/simple; bh=ZorsghkQ70cs9uSm5pxdG8DcA1cViRkBgvVbKUKr3PA=; h=DKIM-Signature:Message-ID:Date:MIME-Version:Subject:To:From; b=uEq0dxtK+LVuoRvEuyyqcmMSRJifZC5tNsR7EvaihFmkyv7BwS1EBtQm5YeXXjv9H21Md3i84JYK+ozce2tKoJAoyNuhwz38zSIwx6lkktnZURbvLS4/g8CwN7JqRt5DTqVdm6kqVuVlUPnc2mCkhxkPaV7dAFUTCovHIwvvkrc= ARC-Authentication-Results: i=1; server2.sourceware.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1699301388; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=/ZsLemn3dxGkwo9CwEJoxgCVIpRAXTsERx46cv6KVMI=; b=G9a1k5XH1IC4r6FafuEJT7oGZ52qD8rzKvck+5o+S/lsny6+nj7QPz/yL04wmDh4eevzzl vUKIydL99qpnX2Rlw+YL/FYuxuDgp/tZMy+X1iCR0oZ3ZiQ7UWmiR9hf7zlA7gCS6JQOi0 lrEs33D+3vbw3s7fZJWEpU6OI7WULY4= Received: from mail-qv1-f69.google.com (mail-qv1-f69.google.com [209.85.219.69]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-100-fLIIwj1WMYm5fjd6VczKsQ-1; Mon, 06 Nov 2023 15:09:46 -0500 X-MC-Unique: fLIIwj1WMYm5fjd6VczKsQ-1 Received: by mail-qv1-f69.google.com with SMTP id 6a1803df08f44-6757f3d7911so23552886d6.1 for ; Mon, 06 Nov 2023 12:09:46 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1699301386; x=1699906186; h=content-transfer-encoding:in-reply-to:from:references:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=/ZsLemn3dxGkwo9CwEJoxgCVIpRAXTsERx46cv6KVMI=; b=OrmM0k4+u8o/Q4BsFPZ8VyCLHZEF9Dq+VDTcrZRqBhGwoKz3gTAHhYwT/DfvGwrmMO irybGpRAb1aeFWZRDFESqBUjzmC+hLHK4M1EMD7Gy0RccX2Tl4FhI7xKke/fLMSU8apo acvbOviE60rhT7nvjmVZRsDJOh/g4raZhUQImzOq5vD5W/807A67veWJpLL//zeufjIe hZCm11mpFmGJfgmOAuwSrmdSt3+ixnZaaTUEBfFxVRuUlhS13qdk8fbSzSSocjiidfDU NSXYolPZJVDY/OU9/o9ASLGiHYgNttpyhb7NedscUT355gi5QeTT1M8MZ/UpomCqyjnk INHQ== X-Gm-Message-State: AOJu0YzK7awSmyLO1UcBZsyl3ff5CWDQ7kMoycOpoT4asMRLNV9uqhSC OqiTANhZzxmm+9Y73e7tJI5d4H+cbwv56MpoFsyk/b/eHnSU2A6QSJg9sIi3PCL5uZmEeVPh987 ZdUDDXwM7a/aeYZXK+1jXxQ== X-Received: by 2002:ad4:5946:0:b0:672:2989:589c with SMTP id eo6-20020ad45946000000b006722989589cmr28750569qvb.27.1699301386498; Mon, 06 Nov 2023 12:09:46 -0800 (PST) X-Google-Smtp-Source: AGHT+IEM/YkYSYMkYYCOzVkJnkjSpERT/lj33DG6yeGwa5VDiPw6FzmCeU3dxJNiHm6Ws4/irDJUtw== X-Received: by 2002:ad4:5946:0:b0:672:2989:589c with SMTP id eo6-20020ad45946000000b006722989589cmr28750560qvb.27.1699301386222; Mon, 06 Nov 2023 12:09:46 -0800 (PST) Received: from [192.168.2.12] (bras-vprn-toroon4834w-lp130-02-142-113-138-136.dsl.bell.ca. [142.113.138.136]) by smtp.gmail.com with ESMTPSA id m9-20020a0ce8c9000000b0065d105f6931sm3761764qvo.59.2023.11.06.12.09.45 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 06 Nov 2023 12:09:45 -0800 (PST) Message-ID: <201ad6f3-0e7d-4474-88bf-ba60568c8f2e@redhat.com> Date: Mon, 6 Nov 2023 15:09:44 -0500 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [RFC] Adding a SECURITY policy for GDB To: Simon Marchi , Andrew Burgess , gdb-patches@sourceware.org References: <877cmvui64.fsf@redhat.com> From: Siddhesh Poyarekar In-Reply-To: X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Language: en-US Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-17.1 required=5.0 tests=BAYES_00, DKIMWL_WL_HIGH, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL, SPF_HELO_NONE, SPF_NONE, TXREP, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gdb-patches@sourceware.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Gdb-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gdb-patches-bounces+public-inbox=simark.ca@sourceware.org On 2023-11-06 14:34, Simon Marchi wrote: > On 11/6/23 08:26, Andrew Burgess wrote: >> In the context of local debugging, any bugs in GDB that result in >> crossing of a privilege boundary are considered security bugs. Some >> examples of crossing a privilege boundary include; being able to >> execute code as an arbitrarily different user, or accessing resources >> (e.g. files, sockets, etc) for which the original user would not >> normally have access. > > Do you have examples of this? It seems like any bug in that category would > be bugs in the platform / OS, not GDB. If such a bug is possible to exploit > with GDB, the user could another program to exploit the same bu That's basically boilerplate to state that *if* such a thing ever happens, it will be considered a security issue. I don't think there are any such opportunities for misuse in gdb at the moment, but never say never :) Thanks, Sid