lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20170823162453.GC32528@arm.com>
Date:   Wed, 23 Aug 2017 17:24:54 +0100
From:   Will Deacon <will.deacon@....com>
To:     torvalds@...ux-foundation.org
Cc:     linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org,
        catalin.marinas@....com, mark.rutland@....com
Subject: [GIT PULL] arm64: Late fixes for 4.13

Hi Linus,

Please pull these late arm64 fixes for 4.13. They fix very early boot
failures with KASLR where the early mapping of the kernel is incorrect,
so the failure mode looks like a hang with no output. There's also a
signal-handling fix when a uaccess routine faults with a fatal signal
pending, which could be used to create unkillable user tasks using
userfaultfd and finally a state leak fix for the floating pointer registers
across a call to exec().

We're still seeing some random issues crop up (inode memory corruption
and spinlock recursion) but we've not managed to reproduce things reliably
enough to debug or bisect them yet.

Please pull,

Will

--->8

The following changes since commit 14ccee78fc82f5512908f4424f541549a5705b89:

  Linux 4.13-rc6 (2017-08-20 14:13:52 -0700)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes

for you to fetch changes up to a067d94d37ed590fd17684d18c3edf52110d305a:

  arm64: kaslr: Adjust the offset to avoid Image across alignment boundary (2017-08-22 18:15:42 +0100)

----------------------------------------------------------------
Late arm64 fixes:

- Fix very early boot failures with KASLR enabled

- Fix fatal signal handling on userspace access from kernel

- Fix leakage of floating point register state across exec()

----------------------------------------------------------------
Ard Biesheuvel (1):
      arm64: kaslr: ignore modulo offset when validating virtual displacement

Catalin Marinas (1):
      arm64: kaslr: Adjust the offset to avoid Image across alignment boundary

Dave Martin (1):
      arm64: fpsimd: Prevent registers leaking across exec

Mark Rutland (1):
      arm64: mm: abort uaccess retries upon fatal signal

 arch/arm64/kernel/fpsimd.c |  2 ++
 arch/arm64/kernel/head.S   |  1 -
 arch/arm64/kernel/kaslr.c  | 20 +++++++++++---------
 arch/arm64/mm/fault.c      |  5 ++++-
 4 files changed, 17 insertions(+), 11 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ