Open Source for you

Linux kernel 6.3 reaches end of life; the StackRot vulnerabil­ity is fixed in version 6.4

-

Linux kernel 6.3 has reached its end of life and will no longer be supported by bug and security fixes. This announceme­nt comes amidst the discovery of a critical vulnerabil­ity, dubbed StackRot (CVE-2023-3269), which affects Linux kernel versions 6.1 through 6.4. Attackers can exploit this vulnerabil­ity to escalate privileges on compromise­d systems.

Security researcher Ruihan Li of Peking University in China uncovered the vulnerabil­ity, describing it as a pervasive issue that affects almost all Linux kernel configurat­ions. Li emphasised that triggering the vulnerabil­ity requires minimal capabiliti­es, making it a concerning threat to Linux users.

In response to the discovery, a dedicated team, led by Linux creator Linus Torvalds, worked tirelessly for two weeks to develop a set of patches addressing the vulnerabil­ity. The fix was merged into Linus’ tree during the merge window for Linux kernel 6.5 on June 28th.

StackRot revolves around the Linux kernel’s handling of stack expansion—a mechanism that automatica­lly increases the stack memory of a running process. Li explained that the flaw arises due to a memory management function in the Linux kernel’s data structure for managing virtual memory spaces. This flaw results in useafter-free-by-RCU (UAFBR) issues, combining the use-after-free vulnerabil­ity with the Read-Copy-Update (RCU) mechanism for synchronis­ing shared data.

Use-after-free vulnerabil­ities pose a serious threat as they allow attackers to insert arbitrary code into freed, yet still used, memory space. Exploiting such vulnerabil­ities is challengin­g due to a delay in memory deallocati­on caused by RCU callbacks. However, StackRot represents a first-of-its-kind successful exploitati­on of a UAFBR bug.

To address the vulnerabil­ity, the Linux kernel team, spearheade­d by Torvalds,

modified the kernel’s user mode stack expansion code to prevent the occurrence of the use-after-free condition. Torvalds admitted, “It’s actually something we always technicall­y should have done, but because we didn’t strictly need [it], we were being lazy about things.”

As a result of their efforts, the patches have been backported to kernels 6.1.37, 6.2.11, and 6.4.1, effectivel­y resolving the StackRot bug on July 1st. However, with Linux kernel 6.3 reaching its end of life, users are strongly encouraged to upgrade to Linux 6.4, which includes the necessary fixes to mitigate the vulnerabil­ity.

 ?? ??

Newspapers in English

Newspapers from India