grsecurity

3.6K posts

grsecurity

grsecurity

@grsecurity

Foundational security for the Linux kernel. Solving the most difficult memory unsafety problems. Created by @opensrcsec

Katılım Haziran 2012
1 Takip Edilen8.8K Takipçiler
grsecurity
grsecurity@grsecurity·
We'll have updated 5.15 and 6.6 patches available shortly (despite 5.15 being EOL) along with split-out patches available for both 5.15 and 6.6 for those on older kernels who need CONFIG_CRYPTO_USER_API_AEAD enabled (which shouldn't be anyone)
English
0
3
12
2.8K
grsecurity
grsecurity@grsecurity·
For RHEL/RHEL-derived configurations, this approach will work (the function name has been stable since 2015 and initcall_blacklist has been supported since 2014): news.ycombinator.com/item?id=479565…
English
0
10
62
9.1K
grsecurity
grsecurity@grsecurity·
Don't rely on mitigation suggestions from others floating around: non-readable suid binaries only does something for this specific exploit, it's exploitable in other ways that don't involve suid binaries at all.
English
2
4
54
8.3K
grsecurity
grsecurity@grsecurity·
Creating a separate post so more people see this: the mitigation recommended by Theori.io for copy.fail *WILL NOT WORK* for any RHEL or RHEL-derived distro, including CentOS, Fedora, Oracle, and Alma as the vulnerable code is built-in.
English
4
59
152
39.1K
grsecurity
grsecurity@grsecurity·
Under a system with LUKS (af_alg loaded at boot) and a non-RHEL-derived config, exploitation will fail as an unprivileged user as follows:
grsecurity tweet media
English
0
3
4
1.1K
grsecurity
grsecurity@grsecurity·
Note that if you're using LUKS, af_alg may be loaded as a module at boot, and if you're using RHEL or a derivative, it builds in CONFIG_CRYPTO_USER_API_AEAD, making MODHARDEN (and the mitigation recommendation from copy.fail) ineffective: oracle.github.io/kconfigs/?conf…
English
1
2
4
1.2K
grsecurity
grsecurity@grsecurity·
As copy.fail (CVE-2026-31431) is a logic flaw, #grsecurity kernels older than our 6.18.21 LTS patch from April 14th with CONFIG_CRYPTO_USER and CONFIG_CRYPTO_USER_API_AEAD built-in or already loaded as a module by a privileged user are affected.
English
1
11
52
6.2K
grsecurity
grsecurity@grsecurity·
Small note regarding the latter stat: it's expected to grow somewhat in the coming months as the Linux CNA still hasn't issued CVEs for the majority of security-relevant fixes from the past few months. Likewise, the former stat will presumably shrink slightly.
English
0
2
2
904
grsecurity
grsecurity@grsecurity·
Our final #grsecurity 5.15 patch is being released today, updated to 5.15.203. Some final stats: it includes ~1300 security/stability-relevant backports missing from upstream 5.15 LTS as well as fixes for 195 CVEs lacking fixes upstream.
English
1
8
11
2K
grsecurity retweetledi
GCC Rust
GCC Rust@gcc_rust·
Our report for March 2026 is out, with the main news being that gccrs will be presenting a talk at Rustconf 2026! We look forward to the event! rust-gcc.github.io/2026/04/13/202…
English
0
5
15
3.4K
grsecurity
grsecurity@grsecurity·
Today, @_minipli has submitted patches for the NVIDIA open gpu kernel modules that implement full Kbuild support, paving the way for CFI, KASAN/UBSAN, and our many compiler plugins. Running AI workloads with NVIDIA GPUs no longer means weakening kernel security. Links below 👇
English
1
9
29
2.9K
grsecurity retweetledi
Qualys
Qualys@qualys·
Qualys Threat Research Unit (TRU) discovered CrackArmor: 9 AppArmor flaws impacting 12M+ Linux systems since 2017. These enable root access & container breakouts. Patch your kernels now! Details: bit.ly/4s2c3O4 #Linux #Cybersecurity #CrackArmor"
Qualys tweet media
English
3
20
35
7.3K
grsecurity
grsecurity@grsecurity·
We expect our 6.19 beta to be available for testing within the next two weeks.
English
0
1
3
2.7K
grsecurity retweetledi
GCC Rust
GCC Rust@gcc_rust·
Here is our report for the first month of 2026, with an interesting little dive into a name resolution problem we fixed this month :) rust-gcc.github.io/2026/02/10/202…
English
0
12
34
3.5K