Summary: | StackRot vulnerability: Linux kernel privilege escalation via VMA | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sam James <sam> |
Component: | Kernel | Assignee: | Gentoo Security <security> |
Status: | CONFIRMED --- | ||
Severity: | normal | CC: | dist-kernel, kernel |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 909777, 909831 | ||
Bug Blocks: |
Description
Sam James
![]() ![]() ![]() ![]() Note that we should stable the latest round of kernels, not the previous ones, as there were fixes for some other arches. Only >= 6.1 is vulnerable, fwiw, but may want to stable the other latest ones just for consistency. The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=5c035a24288407abc36840e708d7877c0556d2bf commit 5c035a24288407abc36840e708d7877c0556d2bf Author: Sam James <sam@gentoo.org> AuthorDate: 2023-07-18 15:56:42 +0000 Commit: Sam James <sam@gentoo.org> CommitDate: 2023-07-18 15:56:42 +0000 profiles: mask bad dist-kernels too Bug: https://bugs.gentoo.org/909829 Signed-off-by: Sam James <sam@gentoo.org> profiles/package.mask | 25 ++++++++++++++++++++----- 1 file changed, 20 insertions(+), 5 deletions(-) |