воскресенье

[Bug 2151831] Re: Dirty Frag LPE security vulnerability

Trying to `git am` the rxrpc fix caused a merge conflict unless on the master branch. I had to cherry-pick 6 other patches, unless someone looks at the code. My work is at https://github.com/linux-surface/linux- surface/pull/2117/changes and I have 8 kernel patches. This covers both the rxrpc and esp parts of the dirty frag vulnerability. The mainline 6.18 kernel builds successfully, but I haven't tested it at runtime. -- You received this bug notification because you are subscribed to linux in Ubuntu. Matching subscriptions: Bgg, Bmail, Nb https://bugs.launchpad.net/bugs/2151831 Title: Dirty Frag LPE security vulnerability Status in kmod package in Ubuntu: Invalid Status in linux package in Ubuntu: Confirmed Bug description: The dirty frag vulnerability is like the copy.fail vulnerability. See: * https://www.openwall.com/lists/oss-security/2026/05/07/8 * https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md * https://askubuntu.com/q/1566558/1004020 kmod should mitigate this via `install ... /bin/false` like done for copy.fail. linux-* should receive a full patch once that's available. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kmod/+bug/2151831/+subscriptions

Комментариев нет:

Отправить комментарий