Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2015-03-10 21:21:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
Exploiting the DRAM rowhammer bug to gain kernel privileges
The Project Zero blog looks
at
the "Rowhammer" bug. "“Rowhammer” is a problem with some
recent DRAM devices in which repeatedly accessing a row of memory can cause
bit flips in adjacent rows. We tested a selection of laptops and found that
a subset of them exhibited the problem. We built two working privilege
escalation exploits that use this effect. One exploit uses
rowhammer-induced bit flips to gain kernel privileges on x86-64 Linux when
run as an unprivileged userland process. When run on a machine vulnerable
to the rowhammer problem, the process was able to induce bit flips in page
table entries (PTEs). It was able to use this to gain write access to its
own page table, and hence gain read-write access to all of physical
memory.
" (Thanks to Paul Wise)


(Читать комментарии) (Добавить комментарий)