StackRot: Newly discovered Linux Kernel vulnerability allows privilege escalation

StackRot: Newly discovered Linux Kernel vulnerability allows privilege escalation

Details have emerged about a newly identified security flaw in the Linux kernel that could allow a user to gain elevated privileges on a target host. Dubbed StackRot (CVE-2023-3269, CVSS score: 7.8), the flaw impacts Linux versions 6.1 through 6.4. There is no evidence that the shortcoming has been exploited in the wild to date.

The flaw, known as StackRot, was found in the handling of stack expansion in the Linux kernel 6.1 through 6.4. The maple tree, responsible for managing virtual memory areas, can undergo node replacement without properly acquiring the MM write lock, leading to use-after-free issues. An unprivileged local user could use this flaw to compromise the kernel and escalate their privileges.

As StackRot is a Linux kernel vulnerability found in the memory management subsystem, it affects almost all kernel configurations and requires minimal capabilities to trigger. However, it should be noted that maple nodes are freed using RCU callbacks, delaying the actual memory deallocation until after the RCU grace period. Consequently, exploiting this vulnerability is considered challenging.

by Paul

  • ...

The Linux kernel is the operating system kernel used by the Linux family of Unix-like operating systems. It is categorized as an Operating System and has an average rating of 4.3. Its top features include being geeky, having a command line interface, and being customizable. Linux kernel has 15 alternatives, with the top alternatives being FreeBSD, Linux-libre, and MINIX 3.

No comments so far, maybe you want to be first?
Gu