Hi Ivan!

Ok so now we have confirmation that the musllibc in LionsOS is vulnerable,
my question is: does LionsOS use musllibc to resolve hostnames (maybe via
libnfs)?

What I'm trying to understand is if this vulnerability can be triggered in
LionsOS in any way.

I already know musllibc will be vulnerable to many bugs in the future (it
is non verified C code...) and also know the difference among verified and
unverified code... my real interest is the robustness of software design,
so in a software solution where there are different pieces glued together,
some of them very reliable (seL4) and some of them very unreliable
(musllibc) and other pieces half way between realiable-unreliable world,
how they interact each other...

So, can this musllibc vulnerability be triggered in LionsOS in any way?

Thank you!



On Wednesday, November 27, 2024, Ivan Velickovic via Devel
<devel@sel4.systems> wrote:
> The musllibc version is quite old yes and so I believe the patch that you
link would not be included
> in the version we pin to. For context, we’ve initially used the musllibc
that other seL4 projects used which
> has not been updated in a long time. That will likely change in the
future [1].
>
> The libc has been used for porting off-the-shelf libraries/components
such as libnfs and MicroPython
> which are already considered untrusted. I believe our trusted components
such as sDDF virtualisers do not
> depend on musllibc at all, which is good because we want to be able to
verify *all* their code.
>
> Given that muslibc is unverified I’m sure that there are many more
vulnerabilities to come!
>
> [1] https://github.com/au-ts/lionsos/issues/48
>
> Ivan
>
> _______________________________________________
> Devel mailing list -- devel@sel4.systems
> To unsubscribe send an email to devel-leave@sel4.systems
>
_______________________________________________
Devel mailing list -- devel@sel4.systems
To unsubscribe send an email to devel-leave@sel4.systems

Reply via email to