Bug 1317576 (CVE-2016-0823) - CVE-2016-0823 kernel: Leakage of physical address mappings to non-privileged userspace
Summary: CVE-2016-0823 kernel: Leakage of physical address mappings to non-privileged ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2016-0823
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1327066 1327067
Blocks: 1317580
TreeView+ depends on / blocked
 
Reported: 2016-03-14 15:21 UTC by Adam Mariš
Modified: 2021-10-21 00:51 UTC (History)
29 users (show)

Fixed In Version: kernel 3.19.3
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-10-21 00:51:14 UTC
Embargoed:


Attachments (Terms of Use)

Description Adam Mariš 2016-03-14 15:21:14 UTC
It was reported that pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3 allows local users to obtain sensitive physical-address information by reading a /proc/<pid>/pagemap file.

The initial fix (commit ab676b7d6fbf4b294bf198fb27ade5b0e865c7ce) put the privilege check directly in the pagemap_open function, which was considered too coarse.  Upstream later moved the check into pagemap_read with commit 1c90308e7a77af6742a97d1021cca923b23b7f0d.  This allows /proc/<pid>/pagemap to be opened and read by non-root users but it does not expose the physical addresses that could be used by the rowhammer exploit.

Upstream patch:

https://github.com/torvalds/linux/commit/ab676b7d6fbf4b294bf198fb27ade5b0e865c7ce

Introduced in commit: 
https://github.com/torvalds/linux/commit/85863e475e59afb027b0113290e3796ee6020b7d

External Reference:

https://googleprojectzero.blogspot.cz/2015/03/exploiting-dram-rowhammer-bug-to-gain.html

Comment 2 Wade Mealing 2016-04-14 08:25:02 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1327067]

Comment 4 Wade Mealing 2016-04-14 08:29:43 UTC
Statement:

This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 5.

This has been rated as having Low security impact and is not currently
planned to be addressed in future updates of 6, 7, and MRG-2. For additional
information, refer to the Red Hat Enterprise Linux Life Cycle:
https://access.redhat.com/support/policy/updates/errata/ .


Note You need to log in before you can comment on or make changes to this bug.