<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[[VULN] ⚠️ &quot;Dirty Frag : cette faille zero-day donne les droits root sur Linux&quot;]]></title><description><![CDATA[<p>[VULN] <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/26a0.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--warning" style="height:23px;width:auto;vertical-align:middle" title="⚠" alt="⚠" />️ "Dirty Frag : cette faille zero-day donne les droits root sur Linux"</p><p>"Dirty Frag, c’est le nom de la nouvelle faille de sécurité critique qui affecte les machines Linux. Cette faille zero-day est similaire à Copy Fail puisqu’elle permet une élévation de privilèges en tant que root. Voici l’essentiel à savoir sur cette menace potentielle.</p><p>La vulnérabilité Dirty Frag a été découverte par le chercheur Hyunwoo Kim, qui avait initialement planifié une divulgation coordonnée pour le 12 mai 2026. Cependant, quelqu’un est parvenu à détecter des informations relatives à cette vulnérabilité, et donc tout a été publié en avance ce jeudi 7 mai 2026."</p><p>Hyunwoo Kim a pris la décision de publier tous les détails, notamment pour alerter la communauté : “Parce que l’embargo a été rompu, aucun correctif ni CVE n’existe pour ces vulnérabilités. Après consultation avec les mainteneurs de linux-distros@vs.openwall.org, et à la demande des mainteneurs, je publie publiquement ce document Dirty Frag.”."<br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f447.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--point_down" style="height:23px;width:auto;vertical-align:middle" title="👇" alt="👇" /> <br /><a href="https://www.it-connect.fr/dirty-frag-cette-faille-zero-day-donne-les-droits-root-sur-linux/" rel="nofollow noopener"><span>https://www.</span><span>it-connect.fr/dirty-frag-cette</span><span>-faille-zero-day-donne-les-droits-root-sur-linux/</span></a><br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/2b07.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--arrow_down" style="height:23px;width:auto;vertical-align:middle" title="⬇" alt="⬇" />️ <br /><a href="https://www.openwall.com/lists/oss-security/2026/05/07/8" rel="nofollow noopener"><span>https://www.</span><span>openwall.com/lists/oss-securit</span><span>y/2026/05/07/8</span></a><br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f447.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--point_down" style="height:23px;width:auto;vertical-align:middle" title="👇" alt="👇" /> <br /><a href="https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md" rel="nofollow noopener"><span>https://</span><span>github.com/V4bel/dirtyfrag/blo</span><span>b/master/assets/write-up.md</span></a></p><p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f4ac.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--speech_balloon" style="height:23px;width:auto;vertical-align:middle" title="💬" alt="💬" /> <br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/2b07.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--arrow_down" style="height:23px;width:auto;vertical-align:middle" title="⬇" alt="⬇" />️ <br /><a href="https://infosec.pub/post/46121720" rel="nofollow noopener"><span>https://</span><span>infosec.pub/post/46121720</span><span></span></a></p><p><a href="https://infosec.exchange/tags/CyberVeille" rel="tag">#<span>CyberVeille</span></a> <a href="https://infosec.exchange/tags/dirtyfrag" rel="tag">#<span>dirtyfrag</span></a> <a href="https://infosec.exchange/tags/linux" rel="tag">#<span>linux</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/4a3dadc4-bf24-4c62-924e-e88b90b9dd74/vuln-dirty-frag-cette-faille-zero-day-donne-les-droits-root-sur-linux</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 01:46:24 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/4a3dadc4-bf24-4c62-924e-e88b90b9dd74.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 08 May 2026 08:41:48 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to [VULN] ⚠️ &quot;Dirty Frag : cette faille zero-day donne les droits root sur Linux&quot; on Fri, 08 May 2026 09:12:48 GMT]]></title><description><![CDATA[<p>variante peu sympa  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f440.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--eyes" style="height:23px;width:auto;vertical-align:middle" title="👀" alt="👀" /> <br />"Unprivileged Linux LPE via xfrm ESP-in-UDP MSG_SPLICE_PAGES no-COW fast path. Page-cache write into any readable file. Overwrites a nologin line in /etc/passwd with sick::0:0:...:/:/bin/bash and sus into it. Same class as Copy Fail (CVE-2026-31431), different subsystem."<br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/2b07.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--arrow_down" style="height:23px;width:auto;vertical-align:middle" title="⬇" alt="⬇" />️ <br /><a href="https://github.com/0xdeadbeefnetwork/Copy_Fail2-Electric_Boogaloo" rel="nofollow noopener"><span>https://</span><span>github.com/0xdeadbeefnetwork/C</span><span>opy_Fail2-Electric_Boogaloo</span></a></p><p><a href="https://infosec.exchange/tags/CyberVeille" rel="tag">#<span>CyberVeille</span></a> <a href="https://infosec.exchange/tags/Linux" rel="tag">#<span>Linux</span></a></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/decio/statuses/116538184098704690</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/decio/statuses/116538184098704690</guid><dc:creator><![CDATA[decio@infosec.exchange]]></dc:creator><pubDate>Fri, 08 May 2026 09:12:48 GMT</pubDate></item></channel></rss>