blob: 6ba1e54aea42667dd3d127aa97d10c25a87b46a9 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
|
Description: mm/gup: fix FOLL_FORCE COW security issue and remove FOLL_COW
References:
https://lore.kernel.org/linux-mm/20220808073232.8808-1-david@redhat.com/
https://www.openwall.com/lists/oss-security/2022/08/08/1
https://lore.kernel.org/all/20220809205640.70916-1-david@redhat.com/
Notes:
carnil> Commit fixes 9ae0f87d009c ("mm/shmem: unconditionally set pte
carnil> dirty in mfill_atomic_install_pte") in 5.16-rc1.
carnil> David Hildenbrand reports that "Kernels before extended uffd-wp
carnil> support and before PageAnonExclusive (< 5.19) can simply revert
carnil> the problematic commit instead and be safe regarding
carnil> UFFDIO_CONTINUE. A backport to v5.19 requires minor adjustments
carnil> due to lack of vma_soft_dirty_enabled()."
Bugs:
upstream: needed
5.10-upstream-stable: N/A "Vulnerable code introduced later"
4.19-upstream-stable: N/A "Vulnerable code introduced later"
sid: released (5.18.16-1) [bugfix/all/Revert-mm-shmem-unconditionally-set-pte-dirty-in-mfi.patch]
5.10-bullseye-security: N/A "Vulnerable code introduced later"
4.19-buster-security: N/A "Vulnerable code introduced later"
|