<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with dirtyfrag]]></title><description><![CDATA[A list of topics that have been tagged with dirtyfrag]]></description><link>https://board.circlewithadot.net/tags/dirtyfrag</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 21:38:00 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/dirtyfrag.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[As I was saying, we&#x27;re not done with page cache LPEs.]]></title><description><![CDATA[@jschauma Cool, another group of people who are going to be Very Interested in any kind of coordinated disclosure.]]></description><link>https://board.circlewithadot.net/topic/2c166fc9-3a8c-4dea-8bae-8e38b0f9ae5b/as-i-was-saying-we-re-not-done-with-page-cache-lpes.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/2c166fc9-3a8c-4dea-8bae-8e38b0f9ae5b/as-i-was-saying-we-re-not-done-with-page-cache-lpes.</guid><dc:creator><![CDATA[hillu@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[The most important thing in reporting security flaws is having your website and a funny name ready for your 15 minutes of fame]]></title><description><![CDATA[@patnat If I had to give a name to a vulnerability, then I'd call it CVE-1871-84711 (as the name.. not a CVE number) .. Just so that the Press that posts about it, has to use the confusing name: CVE-2026-12345 "CVE-1871-84711" and to create utter chaos ]]></description><link>https://board.circlewithadot.net/topic/49b2b8ea-88c2-443b-91c4-86d4719f2ea8/the-most-important-thing-in-reporting-security-flaws-is-having-your-website-and-a-funny-name-ready-for-your-15-minutes-of-fame</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/49b2b8ea-88c2-443b-91c4-86d4719f2ea8/the-most-important-thing-in-reporting-security-flaws-is-having-your-website-and-a-funny-name-ready-for-your-15-minutes-of-fame</guid><dc:creator><![CDATA[larvitz@burningboard.net]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Mitigating Dirty Frag (RHSB-2026-003) on RHEL with Ansible:]]></title><description><![CDATA[Mitigating Dirty Frag (RHSB-2026-003) on RHEL with Ansible: https://codeberg.org/Larvitz/gists/src/branch/main/2026/20260508-RHSB-2026-003_DirtyFrag_RHEL_Mitigation.md#cve #dirtyfrag #rhel #redhat #vulnerability #security]]></description><link>https://board.circlewithadot.net/topic/95bb3c37-61dc-461e-b417-9a80530d8aa0/mitigating-dirty-frag-rhsb-2026-003-on-rhel-with-ansible</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/95bb3c37-61dc-461e-b417-9a80530d8aa0/mitigating-dirty-frag-rhsb-2026-003-on-rhel-with-ansible</guid><dc:creator><![CDATA[larvitz@burningboard.net]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[CVE-2026-43284 &#x2F; &quot;Dirty Frag&quot; .. Antoher one of those nasty local-privilege-escallations.]]></title><description><![CDATA[CVE-2026-43284 / "Dirty Frag" .. Antoher one of those nasty local-privilege-escallations.Quickfix for Centos/Fedora based systems: printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' &gt; /etc/modprobe.d/dirtyfrag.conf &amp;&amp; rmmod esp4 esp6 rxrpc 2&gt;/dev/null; trueCaution: That also effectively disables IPSEC and AFS client support. But it can easily be reverted by removing the file when a patched kernel arrives.#dirtyfrag #cve_2026_43284 #security #centos #fedora #redhat]]></description><link>https://board.circlewithadot.net/topic/c28029e1-11e4-4869-8a46-a5ba61535db7/cve-2026-43284-dirty-frag-..-antoher-one-of-those-nasty-local-privilege-escallations.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/c28029e1-11e4-4869-8a46-a5ba61535db7/cve-2026-43284-dirty-frag-..-antoher-one-of-those-nasty-local-privilege-escallations.</guid><dc:creator><![CDATA[larvitz@burningboard.net]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Btw, there&#x27;s _no_ way we&#x27;re done here with #DirtyFrag and #CopyFail.]]></title><description><![CDATA[Btw, there's _no_ way we're done here with #DirtyFrag and #CopyFail.  Everybody is aiming their LLMs at this attack path through the page cache now, and there's bound to be other ways.Be ready to rinse and repeat a few more times before the dust settles, so I guess keep an even closer eye on linux kernel commits for a while.(And no, I don't know how this will be sustainable.)]]></description><link>https://board.circlewithadot.net/topic/1e957641-0f4f-439a-b755-ab1cf17a8130/btw-there-s-_no_-way-we-re-done-here-with-dirtyfrag-and-copyfail.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/1e957641-0f4f-439a-b755-ab1cf17a8130/btw-there-s-_no_-way-we-re-done-here-with-dirtyfrag-and-copyfail.</guid><dc:creator><![CDATA[jschauma@mstdn.social]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[#DirtyFrag status&#x2F;advisories:]]></title><description><![CDATA[#DirtyFrag status/advisories:AlmaLinux:https://almalinux.org/blog/2026-05-07-dirty-frag/Debian:https://security-tracker.debian.org/tracker/CVE-2026-43500https://security-tracker.debian.org/tracker/CVE-2026-43284Gentoo:https://bugs.gentoo.org/974307RedHat:https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2026-43284https://access.redhat.com/security/cve/cve-2026-43284nothing yet on CVE-2026-43500Rocky:https://kb.ciq.com/article/rocky-linux/rl-dirty-frag-mitigationSUSE / OpenSUSE:https://www.suse.com/security/cve/CVE-2026-43500.htmlhttps://www.suse.com/security/cve/CVE-2026-43284.htmlhttps://www.suse.com/c/addressing-copy-fail2-aka-dirtyfrag-in-suse-virtualization/Ubuntu:https://ubuntu.com/security/CVE-2026-43284https://ubuntu.com/security/CVE-2026-43500https://ubuntu.com/blog/dirty-frag-linux-vulnerability-fixes-availableAWS:https://aws.amazon.com/security/security-bulletins/rss/2026-027-aws/ https://explore.alas.aws.amazon.com/CVE-2026-43284.html]]></description><link>https://board.circlewithadot.net/topic/156a8eb8-344e-407b-84bd-ea0a3e8f9505/dirtyfrag-status-advisories</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/156a8eb8-344e-407b-84bd-ea0a3e8f9505/dirtyfrag-status-advisories</guid><dc:creator><![CDATA[jschauma@mstdn.social]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Dirty Frag #Linux Kernel Flaw Allows Local Privilege Escalation, Patch Now https:&#x2F;&#x2F;9to5linux.com&#x2F;dirty-frag-linux-kernel-flaw-allows-local-privilege-escalation-patch-now]]></title><description><![CDATA[@avoca ]]></description><link>https://board.circlewithadot.net/topic/d255bef8-67de-49fe-a080-229808a5cd43/dirty-frag-linux-kernel-flaw-allows-local-privilege-escalation-patch-now-https-9to5linux.com-dirty-frag-linux-kernel-flaw-allows-local-privilege-escalation-patch-now</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/d255bef8-67de-49fe-a080-229808a5cd43/dirty-frag-linux-kernel-flaw-allows-local-privilege-escalation-patch-now-https-9to5linux.com-dirty-frag-linux-kernel-flaw-allows-local-privilege-escalation-patch-now</guid><dc:creator><![CDATA[9to5linux@floss.social]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[New Linux &#x27;Dirty Frag&#x27; zero-day vulnerability gives root on all major distributions]]></title><description><![CDATA[New Linux 'Dirty Frag' zero-day vulnerability gives root on all major distributionshttps://www.bleepingcomputer.com/news/security/new-linux-dirty-frag-zero-day-with-poc-exploit-gives-root-privileges/- - -Une nouvelle vulnérabilité de jour zéro dans Linux « Dirty frag » donne accès root sur toutes les distributions majeureshttps://www.it-connect.fr/dirty-frag-cette-faille-zero-day-donne-les-droits-root-sur-linux/#Linux #DirtyFrag #InfoSec #Cybersécurité]]></description><link>https://board.circlewithadot.net/topic/33090f9c-e381-4903-990b-5dbf1826e31b/new-linux-dirty-frag-zero-day-vulnerability-gives-root-on-all-major-distributions</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/33090f9c-e381-4903-990b-5dbf1826e31b/new-linux-dirty-frag-zero-day-vulnerability-gives-root-on-all-major-distributions</guid><dc:creator><![CDATA[edwing@mstdn.moimeme.ca]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[#Linux 7.0.5, 6.18.28, 6.12.87, 6.6.138, 6.1.171, 5.15.205, and 5.10.255 kernels are now available for download at https:&#x2F;&#x2F;www.kernel.org to patch the new &quot;Dirty Frag&quot; security vulnerability.]]></title><description><![CDATA[#Linux 7.0.5, 6.18.28, 6.12.87, 6.6.138, 6.1.172, 5.15.206, and 5.10.255 kernels are now available for download at https://www.kernel.org to patch the new "Dirty Frag" security vulnerability.#OpenSource #LinuxKernel #DirtyFrag]]></description><link>https://board.circlewithadot.net/topic/5c00dc59-58a0-41c1-b830-91fa68705f89/linux-7.0.5-6.18.28-6.12.87-6.6.138-6.1.171-5.15.205-and-5.10.255-kernels-are-now-available-for-download-at-https-www.kernel.org-to-patch-the-new-dirty-frag-security-vulnerability.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/5c00dc59-58a0-41c1-b830-91fa68705f89/linux-7.0.5-6.18.28-6.12.87-6.6.138-6.1.171-5.15.205-and-5.10.255-kernels-are-now-available-for-download-at-https-www.kernel.org-to-patch-the-new-dirty-frag-security-vulnerability.</guid><dc:creator><![CDATA[9to5linux@floss.social]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[#LPE — Local Privilege Escalation.]]></title><description><![CDATA[@jwildeboer CVE-2026-23918 against Apache HTTPD was / is at the same time than CopyFail / DirtyFrag and could have been a good way to execute the POC.]]></description><link>https://board.circlewithadot.net/topic/62fe8b51-6f75-40f5-8fc6-30afac0621b3/lpe-local-privilege-escalation.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/62fe8b51-6f75-40f5-8fc6-30afac0621b3/lpe-local-privilege-escalation.</guid><dc:creator><![CDATA[bortzmeyer@mastodon.gougere.fr]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[[VULN] ⚠️ &quot;Dirty Frag : cette faille zero-day donne les droits root sur Linux&quot;]]></title><description><![CDATA[variante peu sympa   "Unprivileged Linux LPE via xfrm ESP-in-UDP MSG_SPLICE_PAGES no-COW fast path. Page-cache write into any readable file. Overwrites a nologin line in /etc/passwd with sick::0:0:...:/:/bin/bash and sus into it. Same class as Copy Fail (CVE-2026-31431), different subsystem."️ https://github.com/0xdeadbeefnetwork/Copy_Fail2-Electric_Boogaloo#CyberVeille #Linux]]></description><link>https://board.circlewithadot.net/topic/4a3dadc4-bf24-4c62-924e-e88b90b9dd74/vuln-dirty-frag-cette-faille-zero-day-donne-les-droits-root-sur-linux</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/4a3dadc4-bf24-4c62-924e-e88b90b9dd74/vuln-dirty-frag-cette-faille-zero-day-donne-les-droits-root-sur-linux</guid><dc:creator><![CDATA[decio@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[&quot;Ah shit, here we go again…&quot;]]></title><description><![CDATA["Ah shit, here we go again…"#dirtyfrag #linux #0day]]></description><link>https://board.circlewithadot.net/topic/eaa4d362-d117-4dfb-8333-f325f54c401e/ah-shit-here-we-go-again</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/eaa4d362-d117-4dfb-8333-f325f54c401e/ah-shit-here-we-go-again</guid><dc:creator><![CDATA[datenwolf@chaos.social]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Given this sentence in &quot;Dirty Frag&quot;:]]></title><description><![CDATA[Given this sentence in "Dirty Frag":"Because the responsible disclosure schedule and the embargo have been broken, no patch exists for any distribution."Can someone please explain to me this portion:&gt; Because the responsible disclosure schedule and the embargo have been broken #DirtyFrag]]></description><link>https://board.circlewithadot.net/topic/9bc00885-00bc-43c8-a79c-b9f4e34887fa/given-this-sentence-in-dirty-frag</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/9bc00885-00bc-43c8-a79c-b9f4e34887fa/given-this-sentence-in-dirty-frag</guid><dc:creator><![CDATA[charette@mstdn.ca]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Something I&#x27;ve complained about when people deploy Linux kernel based OS&#x27;s is so few people ever tune or customizes their kernels or their base distro&#x27;s.]]></title><description><![CDATA[@david_chisnall Ok, yeah this is a good "technically"   point  In my head because the kernel packages you install with the distro includes the modules on disk, I did conflate "in the kernel" and "in the kernel PACKAGE". But isn't that the same thing? How many of those autoloaded modules did you really need?  I'm not setting up tunnels or have hardware encryption options, so why are those auto "opt-in" vs defaulted "opt-out". The remediation for many of these at the start was replace those modules with /bin/false  and things for many people  were just fine without them, so did they really need them? should they have been included on disk? Makes a difference of what you run on your workstation vs a herd of servers as well. I'll take a different path of thought there.]]></description><link>https://board.circlewithadot.net/topic/765c3321-a784-4197-9e36-59596bf4b434/something-i-ve-complained-about-when-people-deploy-linux-kernel-based-os-s-is-so-few-people-ever-tune-or-customizes-their-kernels-or-their-base-distro-s.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/765c3321-a784-4197-9e36-59596bf4b434/something-i-ve-complained-about-when-people-deploy-linux-kernel-based-os-s-is-so-few-people-ever-tune-or-customizes-their-kernels-or-their-base-distro-s.</guid><dc:creator><![CDATA[toxic_flange@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[I&#x27;ve done]]></title><description><![CDATA[@Vive_Levant echo 0 &gt; /proc/sys/kernel/modules_disabled-bash: echo: write error: Invalid argument]]></description><link>https://board.circlewithadot.net/topic/c1f78e70-bc18-42cb-91aa-f2a1821490b2/i-ve-done</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/c1f78e70-bc18-42cb-91aa-f2a1821490b2/i-ve-done</guid><dc:creator><![CDATA[whreq@hsnl.social]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[https:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;1071719&#x2F;]]></title><description><![CDATA[and we have another one. This one with CVE. #dirtyfrag #CVE-2026-43500]]></description><link>https://board.circlewithadot.net/topic/bf3aa504-4bdc-4166-ab06-514cc8b31809/https-lwn.net-articles-1071719</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/bf3aa504-4bdc-4166-ab06-514cc8b31809/https-lwn.net-articles-1071719</guid><dc:creator><![CDATA[mcfly@milliways.social]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[So, the night is still young, and I need distraction from $MEGACORP B.S., so there goes nothing: let&#x27;s test #DirtyFrag on #Slackware 15!]]></title><description><![CDATA[@ParadeGrotesque Noticed the same when I checked earlier, wasn't sure if the default 'huge' kernel was vulnerable, but, the (patched) generic kernel w/ my initrd was also fine (even ignoring the /usr/bin/su vs /bin/su difference)... so, much like with copyfail, I'm left wondering why these modules are loaded by default on so many systems in the first place, since nothing seems to be breaking without them.]]></description><link>https://board.circlewithadot.net/topic/5abb42d1-ee60-440d-85db-25a6a94f9223/so-the-night-is-still-young-and-i-need-distraction-from-megacorp-b.s.-so-there-goes-nothing-let-s-test-dirtyfrag-on-slackware-15</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/5abb42d1-ee60-440d-85db-25a6a94f9223/so-the-night-is-still-young-and-i-need-distraction-from-megacorp-b.s.-so-there-goes-nothing-let-s-test-dirtyfrag-on-slackware-15</guid><dc:creator><![CDATA[miss_rodent@girlcock.club]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Oh FFS.]]></title><description><![CDATA[@jschauma At least it was released with a known mitigation. No idea offhand what the esp4, esp6, and rxrpc modules are used for, though.]]></description><link>https://board.circlewithadot.net/topic/1fc42b2d-1c88-4501-bb22-8c97935cf150/oh-ffs.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/1fc42b2d-1c88-4501-bb22-8c97935cf150/oh-ffs.</guid><dc:creator><![CDATA[bob_zim@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Another #Linux LPE: https:&#x2F;&#x2F;github.com&#x2F;V4bel&#x2F;dirtyfrag&#x2F;]]></title><description><![CDATA[Another #Linux LPE: https://github.com/V4bel/dirtyfrag/#DirtyFrag]]></description><link>https://board.circlewithadot.net/topic/e56a7b0e-593d-4034-9f1a-35c11dda8f6f/another-linux-lpe-https-github.com-v4bel-dirtyfrag</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/e56a7b0e-593d-4034-9f1a-35c11dda8f6f/another-linux-lpe-https-github.com-v4bel-dirtyfrag</guid><dc:creator><![CDATA[jrt@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Another #Linux LPE: https:&#x2F;&#x2F;github.com&#x2F;V4bel&#x2F;dirtyfrag&#x2F;]]></title><description><![CDATA[Another #Linux LPE: https://github.com/V4bel/dirtyfrag/#DirtyFrag]]></description><link>https://board.circlewithadot.net/topic/a8ae5a5d-e08a-4c8c-ab4f-7089d8da0c40/another-linux-lpe-https-github.com-v4bel-dirtyfrag</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/a8ae5a5d-e08a-4c8c-ab4f-7089d8da0c40/another-linux-lpe-https-github.com-v4bel-dirtyfrag</guid><dc:creator><![CDATA[jrt@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>