Keresés

Hirdetés

Új hozzászólás Aktív témák

  • S_x96x_S

    őstag

    válasz Execᵀʰᵀˢ #88 üzenetére

    > Aztakurva, már elnézést.

    A RedHat (egyenlőre) az Inteles grafikus driver letiltását javasolja az ügyfeleinek.
    persze - ekkor nem érhető el nem csak a támadóknak, de a felhasználóknak se .
    .. szerveres környezetben talán még elfogadható.
    Aztán később remélhetőleg lesz "jobb" patch is ...
    https://bugzilla.redhat.com/show_bug.cgi?id=1789209

    "
    A flaw was found in the kernels implementation of the i915 graphics driver where lack of control flow for data structures may allow a local authenticated user to disclose information when issuing ioctl commands to an attached i915 devices.

    How it works:
    1 - Userspace creates a batchbuffer
    2 - Batchbuffer sent to kernel via ioctl
    3 - ioctl (2) issues it as an "Execution Unit" for the hardware.
    4 - The kernel schedules another process to run.
    5- Another process (running as user) can access the previous Execution Unit results by re-using Execution Units results.

    Affected hardware: This flaw affects Gen7, 7.5 and Gen9 hardware only. See [1] The Intel graphics developer guides for information on how to identify your hardware to find if it is affected.

    Mitigation:
    Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs “How do I blacklist a kernel module to prevent it from loading automatically?“ (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.

    This mitigation may not be suitable if the graphical login functionality is required."
    "

    [ Szerkesztve ]

    Mottó: "A verseny jó!"

Új hozzászólás Aktív témák