Protecting against kernel NULL-pointer derefs

Matt Dawson matt at chronos.org.uk
Tue Sep 15 15:22:31 UTC 2009


On Tuesday 15 Sep 2009 13:42:28 Dag-Erling Smørgrav wrote:

> there must be a better way to make your case than to sow FUD?

Where? To paraphrase yourself: Please define "sowing FUD." There's an issue; 
there have been two previously. Nobody is blaming anyone, blowing it out of 
proportion, leaving FBSD in droves or pointing fingers. We know it's local and 
we're all well aware of the axiom "if someone else has physical access to your 
box, it isn't your box any more." I don't see or feel any fear, uncertainty or 
doubt. I just see a concerned but dedicated FBSD user discussing an issue 
sensibly with the information currently to hand.

Providing it does not seriously affect anything else (Pieter has already asked 
for information and opinions before the thread went off on this tangent), if 
setting this #define downgrades arbitrary code execution vulnerabilities and 
privilege escalations to crashes where system and, more importantly IMHO, host 
integrity is preserved then I am all for it. I'd certainly rather have a DoS 
and the risk of cached data loss than a potential information leak or a 
reputation-destroying spamming session run. That we don't have multiple places 
that this could be overridden/reset similar to the SELinux issue also inspires 
confidence in Pieter's method. As simple as it seems, it would appear to be 
(sorry, buzzword-that-fits coming up) proactive in its approach, addressing 
and mitigating any future issues of this type and limiting the possible 
damage.

Also worth thinking about: Do we need to consider -fno-delete-null-pointer-
checks or a downgrade to -O for kernel/world optimisation level for now until 
we're sure there are no more of these lurking? Linux found out the hard way 
that code order matters when compiling at >-O and that perfectly acceptable 
code coupled with assumptions made by the compiler can bite you in the 
backside.
-- 
Matt Dawson
MTD15-RIPE
matt at chronos.org.uk


More information about the freebsd-security mailing list