Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1317576 - (CVE-2016-0823) CVE-2016-0823 kernel: Leakage of physical address mappings to non-privileged userspace
CVE-2016-0823 kernel: Leakage of physical address mappings to non-privileged ...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20150309,reported=2...
: Security
Depends On: 1327066 1327067
Blocks: 1317580
  Show dependency treegraph
 
Reported: 2016-03-14 11:21 EDT by Adam Mariš
Modified: 2018-08-28 18:03 EDT (History)
33 users (show)

See Also:
Fixed In Version: kernel 3.19.3
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2016-03-14 11:21:14 EDT
It was reported that pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3 allows local users to obtain sensitive physical-address information by reading a /proc/<pid>/pagemap file.

The initial fix (commit ab676b7d6fbf4b294bf198fb27ade5b0e865c7ce) put the privilege check directly in the pagemap_open function, which was considered too coarse.  Upstream later moved the check into pagemap_read with commit 1c90308e7a77af6742a97d1021cca923b23b7f0d.  This allows /proc/<pid>/pagemap to be opened and read by non-root users but it does not expose the physical addresses that could be used by the rowhammer exploit.

Upstream patch:

https://github.com/torvalds/linux/commit/ab676b7d6fbf4b294bf198fb27ade5b0e865c7ce

Introduced in commit: 
https://github.com/torvalds/linux/commit/85863e475e59afb027b0113290e3796ee6020b7d

External Reference:

https://googleprojectzero.blogspot.cz/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
Comment 2 Wade Mealing 2016-04-14 04:25:02 EDT
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1327067]
Comment 4 Wade Mealing 2016-04-14 04:29:43 EDT
Statement:

This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 5.

This has been rated as having Low security impact and is not currently
planned to be addressed in future updates of 6, 7, and MRG-2. For additional
information, refer to the Red Hat Enterprise Linux Life Cycle:
https://access.redhat.com/support/policy/updates/errata/ .

Note You need to log in before you can comment on or make changes to this bug.