diff options
author | Kirill A. Shutemov <kirill.shutemov@linux.intel.com> | 2015-03-09 23:11:12 +0200 |
---|---|---|
committer | Andreas Blaesius <skate4life@gmx.de> | 2016-10-12 23:24:52 +0200 |
commit | 4cf5bf40f91756e1b086d062d6ba7e95661e82b0 (patch) | |
tree | 4147398930c8c55bfb6e5a8ed11549f4746299e9 /net/dcb | |
parent | b3413f4a6c00b725aff22049197e3e426ecc9444 (diff) | |
download | kernel_samsung_espresso10-4cf5bf40f91756e1b086d062d6ba7e95661e82b0.zip kernel_samsung_espresso10-4cf5bf40f91756e1b086d062d6ba7e95661e82b0.tar.gz kernel_samsung_espresso10-4cf5bf40f91756e1b086d062d6ba7e95661e82b0.tar.bz2 |
pagemap: do not leak physical addresses to non-privileged userspace
commit ab676b7d6fbf4b294bf198fb27ade5b0e865c7ce upstream.
As pointed by recent post[1] on exploiting DRAM physical imperfection,
/proc/PID/pagemap exposes sensitive information which can be used to do
attacks.
This disallows anybody without CAP_SYS_ADMIN to read the pagemap.
[1] http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
[ Eventually we might want to do anything more finegrained, but for now
this is the simple model. - Linus ]
Change-Id: Ib62bf4429dcdafd9fc1cd9b1a0c5665c64cc5d18
Signed-off-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
Acked-by: Konstantin Khlebnikov <khlebnikov@openvz.org>
Acked-by: Andy Lutomirski <luto@amacapital.net>
Cc: Pavel Emelyanov <xemul@parallels.com>
Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Mark Seaborn <mseaborn@chromium.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Zefan Li <lizefan@huawei.com>
[mancha: Backported to 3.10]
Signed-off-by: mancha security <mancha1@zoho.com>
Diffstat (limited to 'net/dcb')
0 files changed, 0 insertions, 0 deletions