Announcement

Collapse
No announcement yet.

Oracle Linux Security Developer To AMD: "Smatch" Your Driver

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #11
    AMD and security is a bit of a sad story of incompetence and placating users with BS.
    When asked to provide open source PSP code so people can trust it after public review, AMD just said they would instead give it to 3rd party auditors (I KID YOU NOT).
    And their Windows RaidXpert driver package comes with outdated and vulnerable XAMPP stack, the Apache webserver configured to run as SYSTEM user.

    Originally posted by sandy8925 View Post
    Uh huh - Heartbleed was pretty much an overflow bug - didn't check the actual length of the data that was sent - that simple bug sure caused a big ruckus.
    Originally posted by cl333r View Post
    Not trolling, would Rust protect against these types of overflow?
    Rust is a language that guarantees memory safety, so it can protect against certain types of buffer overflow vulnerabilities. In the Heartbleed case however, OpenSSL allocated a buffer out of which several requests were served and did not do proper bounds checking inside that buffer. Rust would not have helped here.

    Comment


    • #12
      Originally posted by chithanh View Post
      AMD and security is a bit of a sad story of incompetence and placating users with BS.
      Ah come on, stop trolling. They are focusing their efforts to get this code mainlined at all in a reasonable timescale, these bugs can be fixed later.

      When asked to provide open source PSP code so people can trust it after public review, AMD just said they would instead give it to 3rd party auditors (I KID YOU NOT).
      The only people that were seriously expecting them to opensource it are completely out of touch with reality.

      And this answer is still better than Intel's (no answer).

      Comment


      • #13
        Yes it would have.
        it would have migitated the issue greatly
        In case you haven’t heard, another serious OpenSSL vulnerability will be announced this Thursday. It reminded me of about a year ago, when Heartbleed was announced: In December 2014 I gave a talk at Mozilla about cryptography in Rust (slides... | Tony Arcieri | Hi there. These days I dabble in Rust and cryptography, but in the past made the Celluloid actor framework for Ruby and the Reia programming language

        Comment


        • #14
          Great, more static analysis tools should be used, hopefully in parallel with Valgrind and the new hype of fuzzers. For instance https://twitter.com/icculus/status/919237418032816128.
          I, for one, welcome our Tool overlords.

          He has valid critique of the code, and now it can be fixed. I don't see any reason for this to stop the merge for 4.15.

          Comment


          • #15
            Originally posted by cl333r View Post

            Not trolling, would Rust protect against these types of overflow?
            Yes.

            There's ~1 million lines of code in the codebase in question. So if you start converting it to Rust now you should be done in a few decades.

            Comment


            • #16
              Originally posted by starshipeleven View Post
              Ah come on, stop trolling. They are focusing their efforts to get this code mainlined at all in a reasonable timescale, these bugs can be fixed later.
              I'm not trolling. Releasing the driver with a remark "this has known security problems" would have been fine if they want to get the code out of the door quickly.

              Originally posted by starshipeleven View Post
              The only people that were seriously expecting them to opensource it are completely out of touch with reality.
              I'm not criticizing AMD for keeping the PSP code proprietary. I am criticizing them for placating customers with such egregious BS.

              Originally posted by starshipeleven View Post
              And this answer is still better than Intel's (no answer).
              If AMD had stopped at saying "we won't release open source PSP" I agree it would have been at least as good as Intel's answer. Alas, they didn't.

              Comment


              • #17
                Originally posted by RealNC View Post
                If it weren't for WebGL, I'd shrug this off with a "meh."

                But now that websites could potentially "root" your machine through the GPU driver using WebGL... Eh, not so "meh" anymore.
                Please list all those sites embracing WebGL.

                Comment


                • #18
                  Originally posted by chithanh View Post
                  AMD and security is a bit of a sad story of incompetence and placating users with BS.
                  When asked to provide open source PSP code so people can trust it after public review, AMD just said they would instead give it to 3rd party auditors (I KID YOU NOT).
                  And their Windows RaidXpert driver package comes with outdated and vulnerable XAMPP stack, the Apache webserver configured to run as SYSTEM user.

                  Rust is a language that guarantees memory safety, so it can protect against certain types of buffer overflow vulnerabilities. In the Heartbleed case however, OpenSSL allocated a buffer out of which several requests were served and did not do proper bounds checking inside that buffer. Rust would not have helped here.
                  Rust is not a panacea. Bounds checking is a development design issue, not a language catcher. The fact this isn't standard practice [bounds checking] in 2017 is a black stain on the idiots developing the software, irregardless of the language used.

                  Comment


                  • #19
                    I find this a little annoying. It's not that I don't believe Carpenter or Smatch, but he sounds like a door-to-door salesman trying to get you to buy a vacuum cleaner by showing you how terrible your current one is, when the reality is you just simply haven't cleaned in a while. AMDGPU has better things to focus on beyond his [mostly] petty findings. I'm not saying these warnings or errors shouldn't be addressed, but his approach sounds more like bragging and self-promotion.

                    I skimmed through some of the warnings and errors produced by Smatch, and frankly, a lot of it is pedantic. Like really, inconsistent indenting? Possible memory leak? Assumed 'hubp' could be null? If you look at things that are provably problems, this list would probably be cut in half, if not shorter.

                    Again: I'm not saying AMD should ignore these things, but saying stuff like "I'm a bit overwhelmed" and "please use Smatch" rubs me the wrong way.
                    Last edited by schmidtbag; 07 November 2017, 01:53 PM.

                    Comment


                    • #20
                      Originally posted by chithanh View Post
                      I'm not trolling. Releasing the driver with a remark "this has known security problems" would have been fine if they want to get the code out of the door quickly.
                      Yeah, kick the whole goddamn USB subsystem out too, while you're at it. https://www.phoronix.com/scan.php?pa...ulnerabilities

                      And don't force me to start digging the list of privilege escalation bugs the kernel still has because none can figure out how to fix some shit (I recall the latest systemd's "privilege escalation" bugs were actually a linux kernel issue, just mitigated by userspace keeping guard.

                      Really, you're blowing this out of proportion. Fuzzing stuff always reveals tons of crap.

                      I'm not criticizing AMD for keeping the PSP code proprietary. I am criticizing them for placating customers with such egregious BS.
                      Huh? third party audit is still better than no audit at all (Intel).

                      Comment

                      Working...
                      X