From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from simark.ca by simark.ca with LMTP id qB0iGPAqSmVYfAAAWB0awg (envelope-from ) for ; Tue, 07 Nov 2023 07:17:52 -0500 Authentication-Results: simark.ca; dkim=pass (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=IzeIuxZ2; dkim-atps=neutral Received: by simark.ca (Postfix, from userid 112) id 5E7B11E0C1; Tue, 7 Nov 2023 07:17:52 -0500 (EST) Received: from server2.sourceware.org (server2.sourceware.org [8.43.85.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (prime256v1) server-digest SHA256) (No client certificate requested) by simark.ca (Postfix) with ESMTPS id 4EF2D1E098 for ; Tue, 7 Nov 2023 07:17:50 -0500 (EST) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id BAE3A3857702 for ; Tue, 7 Nov 2023 12:17:48 +0000 (GMT) Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by sourceware.org (Postfix) with ESMTPS id 68FD13858CDB for ; Tue, 7 Nov 2023 12:17:36 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 68FD13858CDB Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=redhat.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 68FD13858CDB Authentication-Results: server2.sourceware.org; arc=none smtp.remote-ip=170.10.133.124 ARC-Seal: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1699359457; cv=none; b=ZcAMm6s71ATO2tegQkL20GLV+ZTp0+TplDDV55pxTaYQyfbuO5GpRi/mxvS210lXZA0t8G+K1H0cX2/3xjH1uWgpdd/YUaO+7qIlBH32f0J/yWWb/XxPvQKHXoLjWciKsUtn55/oRwMg9IuogHaN7a56RUMEVXZEO/ppCwRjbDU= ARC-Message-Signature: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1699359457; c=relaxed/simple; bh=zOLnMUSDAH+wC1dqu4mBjoRbIt9VedjOupVUKxQXkO8=; h=DKIM-Signature:Message-ID:Date:MIME-Version:Subject:To:From; b=Czwp6/fbcxkW7hODjL54r+OPY//tBdc6XgWVKXbkewNH5Fr0M+/tfUgGn+WXskVQV689Vy4pIvhYCjkkbgci5mCiCam3miwc3CV15a94RASx2FWYFvHHDcygwyP8TSt/S8uWXcr2L59du22NHLyQhr+X7iYyz5op6QeHAnep0J0= ARC-Authentication-Results: i=1; server2.sourceware.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1699359456; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=2M9tRSRvGIK+2ud6MSlszKBEoNUmnTyWRS7UMC8DeVA=; b=IzeIuxZ2sbUQdD+Ek0y0SecFLls6S5NAJ1IA/1iyNY0XjCAUIPiqUf55db3QOYXMmLyQ+k E8TFshqGGwDrUDuO823EYonBtG7mfO9HDmNnV76ez6uGtYY8AaBrxsFLwj/TyqBbwkehAG 5iPsQsM31WBfyWqGW7nQZByEKR++ENc= Received: from mail-qk1-f199.google.com (mail-qk1-f199.google.com [209.85.222.199]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-446-hxMI3NkRN-u_ybPqhgrQbQ-1; Tue, 07 Nov 2023 07:17:34 -0500 X-MC-Unique: hxMI3NkRN-u_ybPqhgrQbQ-1 Received: by mail-qk1-f199.google.com with SMTP id af79cd13be357-77a12fbe7eeso671239785a.2 for ; Tue, 07 Nov 2023 04:17:34 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1699359454; x=1699964254; h=content-transfer-encoding:in-reply-to:from:references:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=2M9tRSRvGIK+2ud6MSlszKBEoNUmnTyWRS7UMC8DeVA=; b=K/XMNFiyopFJzjLOAxkmuW4/s1FKQx9lQ3DRccT7ozLEqvnwPNxurUa0fHmAbIdtzz Loj+Q3P9nFYpINN+hCtKSuqj5KmLThMXfD73TWYGxg/2JZlk64IVp3YwKh3H9dzTffsu JJ+ebdeLNoCutc6ORSIc6o6tdPVZsHbnGp15zFbaSSX/aqDrxOtH2Bzef7pMOV/A0zg6 xw2kdG2lOGbMoc3S0n9ON9uhvA2KNrWnAq5mCdTvwVweLYHP5Wsed7CSnNocQloZ/WtB sGWjxTay0K/UxkZibG0UBvdClL0Wx03caYuYEYuS6ik3IdXuEhZG8Wz6J796wrfe4rMq gH0g== X-Gm-Message-State: AOJu0YxrylWZ6ASclmoIfmv7EWHE1Ho7ToBV5keCcQ9R26MP2Mk+QPih dBnL+6c+w8VTGgMMtRsEPeA8Uvl5qe+uXB1qKR+MwQnCuubekCAZMhxBjtG2MbjjPUj2z8AwvaJ 7evdfoKp5LGjk2wRbOXxikQ== X-Received: by 2002:a05:620a:288c:b0:77b:aa22:9b66 with SMTP id j12-20020a05620a288c00b0077baa229b66mr646452qkp.2.1699359454413; Tue, 07 Nov 2023 04:17:34 -0800 (PST) X-Google-Smtp-Source: AGHT+IHag3RXEgdFhf3EUncI6AqwK2U77xlSzTCtZDEA5nbFAfXiATalVTPUkzKiNonIO+S2E2oupw== X-Received: by 2002:a05:620a:288c:b0:77b:aa22:9b66 with SMTP id j12-20020a05620a288c00b0077baa229b66mr646438qkp.2.1699359454176; Tue, 07 Nov 2023 04:17:34 -0800 (PST) Received: from [192.168.2.12] ([142.113.138.136]) by smtp.gmail.com with ESMTPSA id l11-20020a05620a0c0b00b00767177a5bebsm4107921qki.56.2023.11.07.04.17.33 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 07 Nov 2023 04:17:33 -0800 (PST) Message-ID: <3b60a089-f570-4203-9cdd-bf0b3e47f7e1@redhat.com> Date: Tue, 7 Nov 2023 07:17:24 -0500 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [RFC] Adding a SECURITY policy for GDB To: Simon Marchi , Andrew Burgess , gdb-patches@sourceware.org References: <877cmvui64.fsf@redhat.com> <201ad6f3-0e7d-4474-88bf-ba60568c8f2e@redhat.com> <3b87dddb-9781-46fd-91f3-72cad98f0510@simark.ca> From: Siddhesh Poyarekar In-Reply-To: <3b87dddb-9781-46fd-91f3-72cad98f0510@simark.ca> X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Language: en-US Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-15.7 required=5.0 tests=BAYES_00, DKIMWL_WL_HIGH, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL, RCVD_IN_SORBS_WEB, SPF_HELO_NONE, SPF_NONE, TXREP, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gdb-patches@sourceware.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Gdb-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gdb-patches-bounces+public-inbox=simark.ca@sourceware.org On 2023-11-06 15:15, Simon Marchi wrote: > On 11/6/23 15:09, Siddhesh Poyarekar wrote: >> On 2023-11-06 14:34, Simon Marchi wrote: >>> On 11/6/23 08:26, Andrew Burgess wrote: >>>> In the context of local debugging, any bugs in GDB that result in >>>> crossing of a privilege boundary are considered security bugs. Some >>>> examples of crossing a privilege boundary include; being able to >>>> execute code as an arbitrarily different user, or accessing resources >>>> (e.g. files, sockets, etc) for which the original user would not >>>> normally have access. >>> >>> Do you have examples of this? It seems like any bug in that category would >>> be bugs in the platform / OS, not GDB. If such a bug is possible to exploit >>> with GDB, the user could another program to exploit the same bu >> >> That's basically boilerplate to state that *if* such a thing ever happens, it will be considered a security issue. I don't think there are any such opportunities for misuse in gdb at the moment, but never say never :) > > Ok... it seems strange because it looks like it invites people to report > as GDB bugs what are bugs in other components (e.g. the kernel). An > option would be to say that exploiting GDB to cross a privilege boundary > is considered a bug of the platform, and not a GDB bug. That would be > even less work for us, and technically accurate, AFAIK. An example of such a CVE could be failure to respect umask[1]. I'm not sure how one would word that without risking OS bugs being reported against GDB. I'm inclined to think that it's not as much of a problem at the moment since we haven't historically gotten any reports in this area. Maybe if we start getting reports in this area we could tighten up this text? Thanks, Sid [1] https://blog.rust-lang.org/2023/08/03/cve-2023-38497.html