A flaw was found in the Linux kernels memory deduplication mechanism. Previous work has shown that memory deduplication can be attacked via a local exploitation mechanism. The same technique can be used if an attacker can upload page sized files and detect the change in access time from a networked service to determine if the page has been merged. This attack can leak targeted information if an attacker is wiling to write an exploit for the services running.
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2070414]
Are there any public information available on this flaw? I would like to track the correct status for the kernel in Debian, but fail to find information on this issue. Is this fixed upstream? What are the upstream commit(s)?
This is currently not fixed upstream. I'm no longer doing incident response, so CC'ing rkeshri for further details.
In reply to comment #16: > Are there any public information available on this flaw? I would like to > track the correct status for the kernel in Debian, but fail to find > information on this issue. Is this fixed upstream? What are the upstream > commit(s)? Hello Carnil, https://arxiv.org/pdf/2111.08553.pdf is for reference. thanks
(In reply to Rohit Keshri from comment #18) > In reply to comment #16: > > Are there any public information available on this flaw? I would like to > > track the correct status for the kernel in Debian, but fail to find > > information on this issue. Is this fixed upstream? What are the upstream > > commit(s)? > > Hello Carnil, https://arxiv.org/pdf/2111.08553.pdf is for reference. thanks Thank you!