/srv/irclogs.ubuntu.com/2013/06/14/#ubuntu-kernel.txt

=== amitk is now known as amitk-afk
=== amitk-afk is now known as amitk
=== amitk is now known as amitk-afk
* ppisati -> out for a bit08:39
ogra_hmm, did rtg revert all the CONFIG_VT  stuff in grouper with the latest upload ?10:52
* ogra_ cant get the flipped image to boot anymore ... with console errors as before 10:53
* henrix -> lunch12:03
rtg_henrix, Friday is reboot day. gomeisa first.13:55
henrixrtg_: ack13:56
rtg_henrix, should almost be back by now13:57
=== kentb-oout is now known as kentb
joshhunti have a question about the perf CVE that was part of the USN this morning. does anyone  know if this can  be exploited by a user which does not possess CAP_SYS_ADMIN?15:05
joshhuntactually i'll rephrase. is it exploitable if sysctl_perf_event_paranoid > 0?15:09
rtg_jjohansen, ^^15:26
rtg_chiluk, bouncing tangerine for the dbus update15:41
chilukgo for it15:42
=== slangase` is now known as slangasek
=== kentb-oout is now known as kentb
=== rtg_ is now known as rtg-afk
=== danjared_ is now known as danjared
jjohansenjoshhunt: atm its unclear to me whether CVE-2013-2146 is exploitable with sysctl_perf_event_paranoid==119:11
joshhuntjjohansen: ok thx. yeah i'm not sure either. do you know if any exploit code has been released? i didn't find any in my searches.19:13
jjohansenjoshhunt: paranoid==1 still allows for none capable users to do some things, and I need to spend a fair bit more time with it to unwind all the possible paths19:13
jjohansenjoshhunt: I don't have any, which makes evaluating the possible attacks harder19:13
joshhuntjjohansen: yep, i'll do some more investigation. thx.19:25
* rtg_ -> EOW20:29
joshhuntjjohansen: i think i've convinced myself that you can exploit this with perf_event_paranoid = 121:12
joshhuntjjohansen: it seems like the extra_regs get loaded when an unpriv user does something like: perf stat -e L1-dcache-loads -e L1-dcache-load-misses -e L1-dcache-stores -e L1-dcache-store-misses sleep 1021:13
joshhuntjjohansen: i see this when running this at the same time as root21:14
joshhuntperf stat -a -e probe:* sleep 3021:14
joshhunt Performance counter stats for 'sleep 30':21:14
joshhunt                 4 probe:intel_pmu_hw_config                                    [100.00%]21:14
joshhunt                 4 probe:x86_pmu_hw_config                                      [100.00%]21:14
joshhunt                 4 probe:x86_setup_perfctr                                      [100.00%]21:14
joshhunt                 4 probe:x86_pmu_extra_regs                                    21:14
jjohansenjoshhunt: yep that seem like its exploitable, thanks for digging21:15
=== kentb is now known as kentbout

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!