Hello,

I am the author of the CERT 'exploitable' GDB extension (code here: 
http://www.cert.org/vuls/discovery/triage.html). The extension uses GDB to give 
developers information about how exploitable an application crash might be. 
Right now the extension can only supply useful information for live GDB 
targets. Denys's patches will allow the extension to work on core files as 
well, which will enable more teams performing crash triage to use the tool.

As a specific example of how this is useful, in the case of an access violation 
the extension applies heuristics that try to determine if the access violation 
was due to a read (si_addr == op.source) or a write (si_addr == op.dest). Write 
access violations _generally_ require less effort to exploit than read access 
violations, so, depending on what other heuristics can be applied, the 
extension may consider a write access violation to be more "more exploitable" 
than a read access violation. This information is helpful to developers who may 
have large numbers of crashing test cases to deal with and need to decide which 
ones to address first. 

As it stands, core files do not include si_addr, and so the 'exploitable' GDB 
extension is unable to produce even the most basic analysis when applied to 
them. Denys's patch aims to address this issue, and will therefore allow the 
'exploitable' extension to produce some useful information when executed 
against core files. Since core files have become the standard method of 
communicating crash information in many contexts, these patches will allow for 
increased application of the 'exploitable' extension and in a small way promote 
greater software security for Linux applications.

Please consider accepting these patches.

Thanks,
Jonathan

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to