1. Computers
  2. Display Drivers
  3. Graphics Cards
  4. Memory
  5. Motherboards
  6. Processors
  7. Software
  8. Storage
  9. Operating Systems


Facebook RSS Twitter Twitter Google Plus


Phoronix Test Suite

OpenBenchmarking.org

Working Out "Serious Security Flaws" In DRM Drivers

X.Org

Published on 11 April 2014 09:13 AM EDT
Written by Michael Larabel in X.Org
11 Comments

While many are still busy working through fallout of the OpenSSL Heartbleed bug within organizations, on a separate but security related note, kernel developers specializing in the Direct Rendering Manager (DRM) graphics drivers are working to beef up their own driver security.

Thomas Hellstrom of VMware wrote on the Linux kernel mailing list, "as was discussed a while ago, there are some serious security flaws with the current drm master model, that allows a user that had previous access or current access to an X server terminal to access the GPU memory of the active X server, without being authenticated to the X server and thereby also access other user's secret information."

Security-related bugs within the open-source Linux graphics drivers and X.Org stack are sadly not a rare occurrence. The X.Org security has been characterized by experts as being a disaster that is worse than it looks. Improvements have been made and security vulnerabilities addressed, including some bugs that date back two decades.

Hellstrom is looking to improve the security around DRM drivers in situations like a user using an X.Org Server and locking the screen while an untrusted user could VT switch, open a DRM connection, and guess GEM handle names of the switched-away X Server to dump the video memory objects. There's no DRM driver currently that is immune against three different security flaws noted by Thomas.

In Hellstrom's email he lays out several possibilities for kernel DRM developers to address these security flaws. We'll see in future kernel releases what's done to improve the situation.

About The Author
Michael Larabel is the principal author of Phoronix.com and founded the web-site in 2004 with a focus on enriching the Linux hardware experience and being the largest web-site devoted to Linux hardware reviews, particularly for products relevant to Linux gamers and enthusiasts but also commonly reviewing servers/workstations and embedded Linux devices. Michael has written more than 10,000 articles covering the state of Linux hardware support, Linux performance, graphics hardware drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated testing software. He can be followed via and or contacted via .
Latest Linux Hardware Reviews
  1. The Power Consumption & Efficiency Of Open-Source GPU Drivers
  2. AMD R600g/RadeonSI Performance On Linux 3.16 With Mesa 10.3-devel
  3. Intel Pentium G3258 On Linux
  4. SilverStone Precision PS10
Latest Linux Articles
  1. Nouveau vs. Radeon vs. Intel Tests On Linux 3.16, Mesa 10.3-devel
  2. KVM Benchmarks On Ubuntu 14.10
  3. X.Org Server 1.16 Officially Released With Terrific Features
  4. Ubuntu With Linux 3.16 Smashes OS X 10.9.4 On The MacBook Air
Latest Linux News
  1. Linus Torvalds On GCC 4.9: Pure & Utter Crap
  2. Cauldron 2014: GCC & LLVM Will Look To Collaborate More
  3. GCC Receives ACM Programming Languages Software Award
  4. KDE 4.14 Beta 3 Released
  5. A New Video Has Us Real Excited About The New UT For Linux
  6. CoreOS Experiences Its First Stable Release
  7. GNOME 3.13.4 Continues Working On Wayland & More
  8. Wine 1.7.23 Has Initial Support For 64-bit Android Builds
  9. FreeBSD Developing A New Automounter, Other Features
  10. Guix 0.7 Can Now Install The GNU Operating System
Latest Forum Discussions
  1. Updated and Optimized Ubuntu Free Graphics Drivers
  2. Debian + radeonsi
  3. How To Setup Radeon DPM On Ubuntu Linux
  4. Open-source drivers on ATI R7 260X
  5. New build, first Linux PC, what could go wrong? ;)
  6. AMD "Hawaii" Open-Source GPU Acceleration Still Not Working Right
  7. Radeon related kernel bug??
  8. how the US intellegentia operates: