Pasting from oss-security, where Andy Lutomirski said that a CVE has
been requested.  Fixed in 5.8.7 (presumably also fixed in latest
5.7, but why would you be running that ?)

| Linux 5.7 and 5.8 have a bug in the reference counting of the struct
| page that backs the vsyscall page.  The result is a refcount
| underflow.  This can be triggered by any 64-bit process that is
| permitted to use ptrace() or process_vm_readv().  A creative attacker
| can probably achieve kernel code escalation by using this bug.
| 
| You can prevent the issue from triggering by booting with
| vsyscall=xonly or vsyscall=none.  You can also effectively hotpatch a
| kernel with suitable hardening options by running the updated test
| case noted below -- the test case will underflow the refcount past
| zero, preventing further use of the page.  (A real attacker would
| carefully underflow it exactly to zero but not past.)  Or you can fix
| your kernel.
| 
| (No one should be using vsyscall=emulate any more unless they have a
| very specific use case that requires it.  vsyscall=xonly is better in
| almost all cases.  For some reason, Fedora still seems to be using
| emulate mode, though.)
| 
| Fixed by:
| 
| commit 9fa2dd946743ae6f30dc4830da19147bf100a7f2
| Author: Dave Hansen <dave.han...@linux.intel.com>
| Date:   Thu Sep 3 13:40:28 2020 -0700
| 
|     mm: fix pin vs. gup mismatch with gate pages

ĸen
-- 
I could not live without Champagne.  In victory I deserve it, in
defeat I need it.  -- Churchill
-- 
http://lists.linuxfromscratch.org/listinfo/lfs-dev
FAQ: http://www.linuxfromscratch.org/faq/
Unsubscribe: See the above information page

Reply via email to