TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Teardown of a Failed Linux LTS Spectre Fix

171 pointsby pentestercrabover 5 years ago

12 comments

sdrothrockover 5 years ago
&gt; The takeaways here are that there is a real benefit to having an external&#x2F;independent review and backporting process like the one we perform for our customers<p>That&#x27;s great for sales for these people, but I think the real takeaway here is:<p>&gt; when the actual merge of the tree was performed, no mention was made of [Linus&#x27;s] correction to the [original] fix, and with no specific commit mentioning the correction and fixing it alone, everyone else&#x27;s processes that depended on cherry-picking specific commits ended up grabbing the bad warning-inducing change. As a further failure, instead of looking at Linus&#x27; correct fix (observable by checking out the master tree at the time), the approach employed in the LTS kernels seems to have been to naively silence the warning<p>There are a LOT of process failures in this description of what happened. At the kernel development level, that should be very concerning.<p>It&#x27;s good that an external auditor found it (hooray open source), but this was almost definitely an easily preventable mistake with a better process.<p>&gt; everyone else&#x27;s processes that depended on cherry-picking specific commits<p>This alone sounds horrifying.<p>I don&#x27;t know anything about kernel development, so I don&#x27;t want to sit here and judge and offer advice out of ignorance, but I really do feel like there&#x27;s a better process that would work for them that doesn&#x27;t involve people &quot;cherry-picking specific commits.&quot;
评论 #20875463 未加载
评论 #20875765 未加载
Jachover 5 years ago
&gt; Finally, it should be noted that the &quot;many eyes&quot; of the upstream community failed to notice this flaw; without this blog post it would have likely persisted for many years.<p>Such a spicy remark, this whole post is great. (Though &quot;many eyes&quot; typically refers to an oft-claimed quality of open source generally with no arbitrary distinctions of upstream &#x2F; downstream. grsecurity makes up some of those valued eyes for Linux!)<p>This makes me wonder what other logic errors were introduced into the kernel because of an incorrect resolution to a warning...
justinjlynnover 5 years ago
It&#x27;s wonderful of grsecurity to produce a review like this - it&#x27;ll be extremely helpful in addressing any issues in the development and patch management process. One can only think what improvements we might see in regards to Linux security, as a whole, if they&#x27;d work more proactively with the rest of the community. Of course, they&#x27;re under no obligation to do so.<p>Unfortunately, I doubt that we&#x27;ll ever have their participation - or even see or review any of grsecurity&#x27;s modifications - all because of grsecurity&#x27;s &quot;Access Agreement&quot;. [0] Essentially, if I understand it correctly, even if grsecurity&#x27;s customers wanted to, by sharing grsecurity&#x27;s work with us or anyone else, those customers stand to have their access to the latest grsecurity created derivatives of the Linux kernel revoked. Of course, if that&#x27;s true, facing a penalty for sharing code grsecurity received and modified per the GPL just doesn&#x27;t sound right or just to me.<p>It seems obvious to me that one must carefully consider the wider picture when evaluating linux security posture evaluations, as presented by grsecurity, as there may be conflicts of interest in effect. I take what grsecurity says about the security of the Linux Kernel with a very large grain of salt, and you should as well.<p>Further, I&#x27;m not a legal expert and I use measured tones as grsecurity have taken legal action against open source community members in the past for expressing their opinions [1] on the matter of the access agreement [2]. While those matters were dismissed by the court [3], I am still hesistant to say anything, but find speaking on this matter a neccessary thing to do, for what I perceive to be the good of the community.<p>[0] <a href="https:&#x2F;&#x2F;grsecurity.net&#x2F;agree&#x2F;agreement_faq.php" rel="nofollow">https:&#x2F;&#x2F;grsecurity.net&#x2F;agree&#x2F;agreement_faq.php</a><p>[1] <a href="https:&#x2F;&#x2F;perens.com&#x2F;2017&#x2F;06&#x2F;28&#x2F;warning-grsecurity-potential-contributory-infringement-risk-for-customers&#x2F;" rel="nofollow">https:&#x2F;&#x2F;perens.com&#x2F;2017&#x2F;06&#x2F;28&#x2F;warning-grsecurity-potential-c...</a><p>[2] <a href="https:&#x2F;&#x2F;www.theregister.co.uk&#x2F;2017&#x2F;08&#x2F;03&#x2F;linux_kernel_grsecurity_sues_bruce_perens_for_defamation&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.theregister.co.uk&#x2F;2017&#x2F;08&#x2F;03&#x2F;linux_kernel_grsecu...</a><p>[3] <a href="https:&#x2F;&#x2F;perens.com&#x2F;wp-content&#x2F;uploads&#x2F;sites&#x2F;4&#x2F;2017&#x2F;12&#x2F;file0.43502131597246.pdf" rel="nofollow">https:&#x2F;&#x2F;perens.com&#x2F;wp-content&#x2F;uploads&#x2F;sites&#x2F;4&#x2F;2017&#x2F;12&#x2F;file0....</a>
评论 #20877549 未加载
评论 #20914584 未加载
评论 #20914616 未加载
pornelover 5 years ago
C90 is partly to blame is here. It rejects sensible code due to limitations of hardware and compilers older than Linux itself.<p>I find it hard to believe that a decades old compiler with an actual compile-in-one-pass limitation would produce something useful from the current kernel source. It&#x27;s affecting the the entire kernel development just so that someone somewhere with an abandonware compiler doesn&#x27;t get a shock of updating it once every 30 years.
评论 #20876261 未加载
评论 #20878097 未加载
评论 #20878033 未加载
jandeboevrieover 5 years ago
Man that attitude of the grsecurity folks is bad. Oh look how great our process and fix is and how fast we are. And look how bad them kernel folks are. Yuk.
评论 #20876987 未加载
评论 #20876112 未加载
评论 #20876956 未加载
评论 #20878461 未加载
评论 #20876954 未加载
评论 #20881231 未加载
评论 #20881027 未加载
misc228over 5 years ago
GRSecurity is violating the GPL, and thus violating the linux programmers copyrights, as Bruce Perens explained: <a href="https:&#x2F;&#x2F;linux.slashdot.org&#x2F;story&#x2F;17&#x2F;07&#x2F;09&#x2F;188246&#x2F;bruce-perens-warns-grsecurity-breaches-the-linux-kernels-gpl-license" rel="nofollow">https:&#x2F;&#x2F;linux.slashdot.org&#x2F;story&#x2F;17&#x2F;07&#x2F;09&#x2F;188246&#x2F;bruce-peren...</a><p><a href="http:&#x2F;&#x2F;perens.com&#x2F;blog&#x2F;2017&#x2F;06&#x2F;28&#x2F;warning-grsecurity-potential-contributory-infringement-risk-for-customers&#x2F;" rel="nofollow">http:&#x2F;&#x2F;perens.com&#x2F;blog&#x2F;2017&#x2F;06&#x2F;28&#x2F;warning-grsecurity-potenti...</a><p>Brad Spengler &#x2F; PaxTeam &#x2F; GRSecurity have no right to modify the linux code nor redistribute derivative works of it thusly.<p>Placing a &quot;no redistribution or else&quot; clause in a &quot;separate writing&quot; does not absolve one from the requirement NOT to stymie the linux programmer&#x27;s stipulation in their license that such restrictions NOT be created by distributees or those who have created derivative works.<p>The linux programmers should sue Spengler, or simply revoke his license (another option: gratis licenses are freely revocable: they are not secured by an interest, and as-far-as-we-know Spengler has not payed the linux licensors for a license).
archi42over 5 years ago
There was another post on this here: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=20871727" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=20871727</a> (10h ago, pointing to a short excerpt on lwn.net; 3 comments)<p>Though I like this one more, as it points to the source.
sambeover 5 years ago
I&#x27;m struggling to see how the backporters thought this was an acceptable transformation. I don&#x27;t know any of this code, and even the warning seems a little opaque to me initially. But it seems very obvious that you can&#x27;t just reorder the lines.
评论 #20876391 未加载
atheowaway4zover 5 years ago
Does anybody know what triggered the original fix in the first place? Just grep-ing?<p>If the kernel folks did what this company did . I.e have the compiler detect vulnerable code . The issue would have been avoided as well right ?
评论 #20876323 未加载
评论 #20877239 未加载
mehrdadnover 5 years ago
Is it just me or there an elephant in the room no one is talking about?<p>To me, so much blame lies with C&#x27;s arcane rules, in this case for forcing you to declare variables earlier than you need them. If the compiler hadn&#x27;t complained pointlessly and just let the programmer declare variables where they&#x27;re needed, people wouldn&#x27;t have had to try to &quot;fix&quot; it to begin with.<p>Apparently people would prefer to blame the kernel developers than the immaculate language that is C though...
phil9987over 5 years ago
So Linus fucked it up?!
评论 #20875376 未加载
评论 #20875367 未加载
unnouinceputover 5 years ago
So the only question remains, based on history of Chinese government (well, not only them but in this case the developer was a Chinese) wanting to weaken the security of software - was this intentional, and then the Chinese developer is a mole from them, or was a honest mistake?
评论 #20875744 未加载
评论 #20875412 未加载