-
Notifications
You must be signed in to change notification settings - Fork 204
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security mitigations and hardening #54
Comments
The TOCTOU part is already solved, see the last comment in #55. |
Right, I updated that point. |
From what I understand, only the first item ("We need better sanitization of OCALL arguments") must be resolved for the release (so priority P0 or P1). The rest (sanitizers/linters) is to be added after the release (so priority P2). For this reason, I'm marking this whole issue as P2. Notice that gramineproject/graphene#1236 linked to the first item is already marked as P0. |
Yup. Although the OCALL thing is a bit of an unknown area, I think all obviously dangerous places are sanitized already, only some more subtle ones are left. But we should resolve it rather sooner than later to not risk having security vulns. But if gramineproject/graphene#1236 is P0 then this can stay at P2. |
I think we can close this issue. @mkow If you think that some parts are still relevant, I suggest to create a new issue then. |
Most of them were solved or brought to a state where further improvements would yield only small gains, so I'm fine with closing it. |
Ideas for security mitigations and "bug prevention"
Mitigations/sanitizations
Bug detection
__user
-like specifier to check for TOCTOU bugs during compilation (gramineproject/graphene#635; most relevant for OCALLs).The text was updated successfully, but these errors were encountered: