https://bugs.freedesktop.org/show_bug.cgi?id=74532
Priority: medium Bug ID: 74532 Keywords: security Assignee: dri-devel at lists.freedesktop.org Summary: Sanitize all freed GPU memory Severity: normal Classification: Unclassified OS: Linux (All) Reporter: nikoli at gmx.us Hardware: All Status: NEW Version: unspecified Component: General Product: DRI X11 applications are able to get and display in human readable form parts of closed applications, see: https://github.com/mpv-player/mpv/issues/521 It means applications like skype can silently send much more data, then you expect, even when you run them as separate user. Asked about this security problem in #gentoo-hardened, #radeon and #dri-devel, summarizing: 0) Currently GPU memory is not sanitized by kernel, nothing enforces and ensures its sanitizing. 1) https://grsecurity.net Linux kernel patches add ability to sanitize all freed memory, but they do not affect GPU memory: https://en.wikibooks.org/wiki/Grsecurity/Appendix/Grsecurity_and_PaX_Configuration_Options#Sanitize_all_freed_memory 2) The only secure place to clean memory is kernel, because if application or X server crashes, memory will not be erased. 3) Some applications possibly will work slower, so better make sanitizing configurable by adding build and run time kernel options. 4) Most likely this problem affects opencl too. -- You are receiving this mail because: You are the assignee for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.freedesktop.org/archives/dri-devel/attachments/20140204/13fe4f55/attachment.html>