Get the latest tech news
Race conditions in Linux Kernel perf events
We disclosed this vulnerability to the kernel security team through responsible disclosure.The patch on the mailing list is visible here. We are publishing the vulnerability to demonstrate that it is fully exploitable and to ensure that the technical details are available.
No CVE number has been assigned yet, as per the kernel teams policy CVEs are only issued once a fix is available and rolled out.We will retroactively add that information when it becomes available. In particular as long as check_pages_enabled is true, the exploit strategy laid out in this blog post will not work.This is the case if init_on_alloc, page poisoning, init_on_free, CONFIG_DEBUG_PAGEALLOC or CONFIG_DEBUG_VM are enabled. user_page points to a special page that the user space can write to, to communicate ring buffer state and configuration.
Or read this on Hacker News