Thorsten Leemhuis (1/4) · @kernellogger
1933 followers · 1540 posts · Server fosstodon.org

Remember CVE-2023-3269 aka , a vulnerability found in the memory management subsystem of 6.1 - 6.4 which became partly public earlier this month when it was fixed[1]?

The complete exploit code and a comprehensive write-up are now out: github.com/lrh2000/StackRot

[1] fosstodon.org/@kernellogger/11

#stackrot #linux #kernel

Last updated 1 year ago

Ultimo :verified: · @vforvendetta
15 followers · 193 posts · Server mastodon.uno
luna · @luna
15 followers · 69 posts · Server social.linux.pizza

Xenia Linux has been updated to include the latest software versions, including kernel 6.1.38 which fixes stackrot. Both unstable and stable are now updated. Please update your system when possible! @xenia

#xenia #gentoo #stackrot

Last updated 1 year ago

luna · @luna
15 followers · 69 posts · Server social.linux.pizza

@xenia is currently being updated with a new kernel version to fix StackRot. Sorry about being so late! Unfortunate timing for me to go on holiday it seems.

unstable is already updated, and I'm building stable/main now. Hang tight!

#xenia #gentoo #linux #stackrot

Last updated 1 year ago

Ian Kluft ✅🖥️📡 · @KO6YQ
73 followers · 503 posts · Server sfba.social

" Shows Exploitability of UAFBR Bugs" by @SecurityWeek / @EduardKovacs - CVE-2023-3269 bug in Read-Copy-Update (RCU) code since 6.1, fixed in 6.1.37, 6.3.11 & 6.4.1 securityweek.com/stackrot-linu

#stackrot #linux #kernel #vulnerability #cybersecurity #opensource #software #tech

Last updated 1 year ago

AlternativeTo · @alternativeto
960 followers · 1330 posts · Server mas.to

🐧 A security flaw called has been discovered in the kernel versions 6.1 through 6.4, which could allow a user to gain elevated privileges on a target host. However, exploiting the flaw is considered challenging.
alternativeto.net/news/2023/7/

#Linux #stackrot

Last updated 1 year ago

Redhotcyber · @redhotcyber
532 followers · 1466 posts · Server mastodon.bida.im
Thorsten Leemhuis (1/4) · @kernellogger
1833 followers · 1408 posts · Server fosstodon.org

In case you wondered why Linus recently fiddled with the user mode stack expansion code in mainline[1], here is your explanation:

CVE-2023-3269. privilege escalation vulnerability – openwall.com/lists/oss-securit

" is a vulnerability found in the memory management subsystem [of 6.1 - 6.4], it affects almost all configurations and requires minimal capabilities to trigger"

[1] git.kernel.org/torvalds/c/9471 , which was followed by several fix-up patches in the past week

#linuxkernel #stackrot #linux #kernel

Last updated 1 year ago