Priority | medium |
---|---|
Bug ID | 74532 |
Keywords | security |
Assignee | dri-devel@lists.freedesktop.org |
Summary | Sanitize all freed GPU memory |
Severity | normal |
Classification | Unclassified |
OS | Linux (All) |
Reporter | nikoli@gmx.us |
Hardware | All |
Status | NEW |
Version | unspecified |
Component | General |
Product | DRI |
X11 applications are able to get and display in human readable form parts of closed applications, see: https://github.com/mpv-player/mpv/issues/521 It means applications like skype can silently send much more data, then you expect, even when you run them as separate user. Asked about this security problem in #gentoo-hardened, #radeon and #dri-devel, summarizing: 0) Currently GPU memory is not sanitized by kernel, nothing enforces and ensures its sanitizing. 1) https://grsecurity.net Linux kernel patches add ability to sanitize all freed memory, but they do not affect GPU memory: https://en.wikibooks.org/wiki/Grsecurity/Appendix/Grsecurity_and_PaX_Configuration_Options#Sanitize_all_freed_memory 2) The only secure place to clean memory is kernel, because if application or X server crashes, memory will not be erased. 3) Some applications possibly will work slower, so better make sanitizing configurable by adding build and run time kernel options. 4) Most likely this problem affects opencl too.
You are receiving this mail because:
- You are the assignee for the bug.
_______________________________________________ dri-devel mailing list dri-devel@xxxxxxxxxxxxxxxxxxxxx http://lists.freedesktop.org/mailman/listinfo/dri-devel