[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] Partial SMAP bypass on 64-bit Linux kernels
From:       Andy Lutomirski <luto () kernel ! org>
Date:       2016-02-26 20:28:23
Message-ID: CALCETrWner1C6Niczzx-mRay_YVb4fxS7xXLx66v1p+7tkU73g () mail ! gmail ! com
[Download RAW message or body]

Hi all-

Those of you using 64-bit Linux kernels on SMAP-capable systems (which
are still very rare in the server space) with ia32 emulation enabled
will want to backport:

https://git.kernel.org/cgit/linux/kernel/git/tip/tip.git/commit/?h=x86/urgent&id=3d44d51bd339766f0178f0cf2e8d048b4a4872aa


That patch fixes a bug that exposed a fairly large kernel code surface
to a straightforward SMAP bypass.

Credit to Brian Gerst who noticed the bug.

This bug is present in all kernels from 3.10 on AFAICT.  Kernels
before 3.10 don't support SMAP in the first place.  32-bit kernels are
not affected (but why would you be running a 32-bit kernel on
SMAP-capable hardware in the first place?).

--Andy


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic