1. Computers
  2. Display Drivers
  3. Graphics Cards
  4. Memory
  5. Motherboards
  6. Processors
  7. Software
  8. Storage
  9. Operating Systems


Facebook RSS Twitter Twitter Google Plus


Phoronix Test Suite

OpenBenchmarking.org

Working Out "Serious Security Flaws" In DRM Drivers

X.Org

Published on 11 April 2014 09:13 AM EDT
Written by Michael Larabel in X.Org
11 Comments

While many are still busy working through fallout of the OpenSSL Heartbleed bug within organizations, on a separate but security related note, kernel developers specializing in the Direct Rendering Manager (DRM) graphics drivers are working to beef up their own driver security.

Thomas Hellstrom of VMware wrote on the Linux kernel mailing list, "as was discussed a while ago, there are some serious security flaws with the current drm master model, that allows a user that had previous access or current access to an X server terminal to access the GPU memory of the active X server, without being authenticated to the X server and thereby also access other user's secret information."

Security-related bugs within the open-source Linux graphics drivers and X.Org stack are sadly not a rare occurrence. The X.Org security has been characterized by experts as being a disaster that is worse than it looks. Improvements have been made and security vulnerabilities addressed, including some bugs that date back two decades.

Hellstrom is looking to improve the security around DRM drivers in situations like a user using an X.Org Server and locking the screen while an untrusted user could VT switch, open a DRM connection, and guess GEM handle names of the switched-away X Server to dump the video memory objects. There's no DRM driver currently that is immune against three different security flaws noted by Thomas.

In Hellstrom's email he lays out several possibilities for kernel DRM developers to address these security flaws. We'll see in future kernel releases what's done to improve the situation.

About The Author
Michael Larabel is the principal author of Phoronix.com and founded the web-site in 2004 with a focus on enriching the Linux hardware experience and being the largest web-site devoted to Linux hardware reviews, particularly for products relevant to Linux gamers and enthusiasts but also commonly reviewing servers/workstations and embedded Linux devices. Michael has written more than 10,000 articles covering the state of Linux hardware support, Linux performance, graphics hardware drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated testing software. He can be followed via and or contacted via .
Latest Articles & Reviews
  1. Samsung 850 EVO SSD Linux Benchmarks
  2. Kubuntu 15.04 Is Turning Out Quite Nice, Good Way To Try Out The Latest KDE
  3. 5-Way Linux Distribution Comparison On The Core i3 NUC
  4. OCZ ARC 100 Linux SSD Benchmarks
  5. Lenovo ThinkPad X1 Carbon Works Great As A Linux Ultrabook
  6. Transcend SSD370 256GB
Latest Linux News
  1. 8cc: A Small C11 Compiler
  2. Not Everyone Likes The Possible "VULKAN" Name For Next-Gen OpenGL
  3. The Binary Blobs Making Up Coreboot
  4. Linux 4.0 & LLVM vs. GCC Yielded Much Interest This Month
  5. XBMC/Kodi 15.0 Alpha 1 Released
  6. Xfce 4.12 Released After Nearly Three Years Of Work
  7. The Khronos Group Filed A Trademark On "Vulkan" API
  8. Mozilla Thunderbird Adoption Climbs, Thunderbird 38 In May
  9. The Most Popular Linux Benchmark Results On OpenBenchmarking.org
  10. Intel's Graphics Driver For Linux 4.1 Will Have More XenGT vGPU Support
Most Viewed News This Week
  1. Linux 4.0-RC1 Tagged, Linux 4.0 Will Bring Many Notable Improvements
  2. Screenshots Of The GNOME 3.16 Changes
  3. More Proof That Allwinner Is Violating The GPL
  4. The Tremendous Features Of Fedora 22
  5. Linux 4.0 Doesn't Have The Weirdest Codename
  6. Krita 2.9 Released, Their Biggest Release Ever
  7. A Single UEFI Executable With The Linux Kernel, Initrd & Command Line
  8. Canonical Comes Up With Its Own FUSE Filesystem For Linux Containers
%%CLICK_URL_UNESC%%