KSPP / linux

Linux kernel source tree (Kernel Self Protection Project)
https://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project
Other
83 stars 5 forks source link

Explore performing taint-tracking of writes to kernel addresses that came from userspace #126

Open kees opened 3 years ago

kees commented 3 years ago

It should be possible to perform taint tracking of addresses (or any data, really) in the kernel to avoid flaws of the form:

copy_from_user(object, src, ...);
...
*no validation of object.address*
...
memcpy(object.address, something, ...);

We need better tooling to perform this kind of "taint tracking" within the kernel to better catch cases where validation is missing.

On the static analysis front:

Better yet would be run-time analysis: