[llvm-dev] [RFC] LLVM Security Group and Process

James Y Knight via llvm-dev llvm-dev at lists.llvm.org
Tue Nov 19 06:59:59 PST 2019


On Mon, Nov 18, 2019 at 6:00 PM JF Bastien via llvm-dev <
llvm-dev at lists.llvm.org> wrote:

>
>
> On Nov 18, 2019, at 2:42 PM, David Blaikie via llvm-dev <
> llvm-dev at lists.llvm.org> wrote:
>
>
>
> On Mon, Nov 18, 2019 at 2:31 PM Robinson, Paul via llvm-dev <
> llvm-dev at lists.llvm.org> wrote:
>
>> One problem with defining away “arbitrary code execution in Clang” as
>> “not security relevant” is that you are inevitably making probably-wrong
>> assumptions about the set of all possible execution contexts.
>>
>>
>>
>> Case in point:  Sony, being on the security-sensitive side these days,
>> has an internal mandate that we incorporate CVE fixes into open-source
>> products that we deliver.  As it happens, we deliver some GNU Binutils
>> tools with our PS4 toolchain.  There are CVEs against Binutils, so we were
>> mandated to incorporate these patches.  “?” I said, wondering how some
>> simple command-line tool could have a CVE.  Well, it turns out, lots of the
>> Binutils code is packaged in libraries, and some of those libraries can be
>> used by (apparently) web servers, so through some chain of events it would
>> be possible for a web client to induce Bad Stuff on a server (hopefully no
>> worse than a DoS, but that’s still a security issue).  Ergo,
>> security-relevant patch in GNU Binutils.
>>
>>
>>
>> For **my** product’s delivery, the CVEs would be irrelevant.  (Who cares
>> if some command-line tool can crash if you feed it a bogus PE file; clearly
>> not a security issue.)  But, for someone *else’s* product, it *would* be
>> a security issue.  You can be sure that the people responsible for Binutils
>> dealt with it as a security issue.
>>
>>
>>
>> So, yeah, arbitrary code-execution in Clang, or more obviously in the
>> JIT, is a potential security issue.  Clangd probably should worry about
>> this kind of stuff too.  And we should be ready to handle it that way.
>>
>
> The reality is that clang is a long way from being hardened in that way
> (pretty much every crash/assertion failure on invalid input is probably a
> path to arbitrary code execution if someone wanted to try hard enough) & I
> don't think the core developers are currently able to/interested
> in/motivated to do the work to meet that kind of need - so I tend to agree
> with James that it's better that this is clearly specified as a non-goal
> than suggest some kind of "best effort" behavior here.
>
>
> I’d rephrase this: it’s not currently something that LLVM developers have
> tried to address, and it’s known to be insecure. Were someone to come in
> and commit significant amount of work, it would definitely be something we
> can support.
>
> I don’t want to say “non-goal” without explaining *why* that’s the case,
> and what can be done to change things. In other words, if the security
> group is willing to call something security-related, then it is. Whoever is
> in that group has to put in the effort to address an issue. Until such
> people are part of the group, the group should respond to issues of this
> kind as “out of scope because <good reason>”.
>
> I agree we should document those reasons as we encounter them! I just
> don’t think we should try to enumerate them right now. We’ll have a
> transparency report, and that’s a great opportunity to revisit what we
> think is / isn’t in scope, and call it out.
>

I think that's a problematic way to go about things, because the security
group has limited membership and the discussions are private and limited --
even if there's limited visibility after-the-fact. That is certainly a
necessary and desirable property when working to resolve undisclosed
vulnerabilities, but it is not when making general decisions about what we
as a project want to claim to support. Of course, we all will need to trust
the people on the security group to make certain decisions on a
case-by-case basis, but the discussion about what we want to be security
supported should be -- must be -- public.

This is not simply about deciding how to resolve an *issue* that's reported
externally, it's about the entire process. The project needs to be on the
same page as to what our security boundaries are, otherwise the security
group will just end up just doing CVE-issue-response theater.

And I do agree that if someone were to come in and put in the significant
amounts of work to make LLVM directly usable in security-sensitive places,
then we could support that. But none of that should have anything to do
with the security group or its membership. All of that work and discussion,
and the decision to support it in the end, should be done as a project-wide
discussion and decision, just like anything else that's worked on.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-dev/attachments/20191119/00246ed0/attachment.html>


More information about the llvm-dev mailing list