<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure.]]></title><description><![CDATA[<p>The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure.</p><ol><li><strong><a href="https://infosec.exchange/@wdormann/116489443704631952">Copy Fail</a></strong>: Publicity stunt where they claim to have done the right thing, yet didn't bother to tell a single distro vendor, and lied about updates being available.</li><li><strong><a href="https://infosec.exchange/@wdormann/116535129483797487">Dirty Frag</a></strong>: Attempted to do proper coordination, including notifying the <code>linux-distros</code> mailing list.  But the <a href="https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md#disclosure-timeline" rel="nofollow noopener">embargo was broken</a>, so it was disclosed unexpectedly ahead of time.</li><li><strong><a href="https://infosec.exchange/@wdormann/116536031268240371">Copy Fail 2</a></strong>:  <a href="https://www.openwall.com/lists/oss-security/2026/05/07/12" rel="nofollow noopener">Discovered as an n-day by looking at kernel commit logs and Spender noticing that it was copyfail-class</a></li></ol><p>Each path had basically exactly the same outcome (No fixes at publication time).  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f602.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--joy" style="height:23px;width:auto;vertical-align:middle" title="😂" alt="😂" /></p>]]></description><link>https://board.circlewithadot.net/topic/94bb46d6-cb94-4253-a480-ce638b1f74e3/the-3-recent-linux-lpes-are-sort-of-interesting-in-that-each-one-took-a-different-path-from-discovery-to-disclosure.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 02:52:07 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/94bb46d6-cb94-4253-a480-ce638b1f74e3.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 08 May 2026 03:31:00 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Wed, 13 May 2026 17:57:11 GMT]]></title><description><![CDATA[<p><span><a href="/user/erlenmayr%40chaos.social" rel="nofollow noopener">@<span>erlenmayr</span></a></span> <br />Using / telling others a CVE ID before it <a href="https://www.cve.org/CVERecord/SearchResults?query=CVE-2026-46300" rel="nofollow noopener">actually exists</a> is a choice, sure.</p><p>But is not the recommended way to use CVE.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116568557567403806</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116568557567403806</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 17:57:11 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Wed, 13 May 2026 17:33:23 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> <a href="https://security-tracker.debian.org/tracker/CVE-2026-46300" rel="nofollow noopener"><span>https://</span><span>security-tracker.debian.org/tr</span><span>acker/CVE-2026-46300</span></a></p>]]></description><link>https://board.circlewithadot.net/post/https://chaos.social/users/erlenmayr/statuses/116568464022948360</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://chaos.social/users/erlenmayr/statuses/116568464022948360</guid><dc:creator><![CDATA[erlenmayr@chaos.social]]></dc:creator><pubDate>Wed, 13 May 2026 17:33:23 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Wed, 13 May 2026 17:09:45 GMT]]></title><description><![CDATA[<p><span><a href="/user/awkwardturing%40infosec.exchange">@<span>AwkwardTuring</span></a></span> <br />Oh, sorry.  I suppoi didn't read your message too carefully. <br />No, it's a separate patch, and therefore it should expected that the Dirty Frag <strong>patch</strong> does not fix fragnesia. The reasoning is that patches are precise, the mitigation for Dirty Frag is painted with a broad stroke (module level).</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116568371046684670</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116568371046684670</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 17:09:45 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Wed, 13 May 2026 17:02:57 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> misunderstanding <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f642.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title=":)" alt="🙂" /> I meant if dirty frag &gt;patch&lt; works for fragnesia</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/AwkwardTuring/statuses/116568344324216336</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/AwkwardTuring/statuses/116568344324216336</guid><dc:creator><![CDATA[awkwardturing@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 17:02:57 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Wed, 13 May 2026 16:57:20 GMT]]></title><description><![CDATA[<p><span><a href="/user/awkwardturing%40infosec.exchange">@<span>AwkwardTuring</span></a></span> <br />Yes, the Dirty Frag mitigation works to protect against fragnesia CVE-2026-46300 as well.</p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/568/320/764/016/035/original/6caaa72490d95f19.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116568322225286895</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116568322225286895</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 16:57:20 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Wed, 13 May 2026 16:49:09 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> oooooh, look at that shiny flickering ASCII animation. No AI-vuln-something marketing content here at all.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/hillu/statuses/116568290087187202</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/hillu/statuses/116568290087187202</guid><dc:creator><![CDATA[hillu@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 16:49:09 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Wed, 13 May 2026 16:48:39 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> from GitHub: "This is a separate bug in the ESP/XFRM from dirtyfrag which has received its own patch. However, it is in the same surface and the mitigation is the same as for dirtyfrag."</p><p>Curious phrasing. Does that mean the patch (not: the mitigation) will work for this as well or no?</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/AwkwardTuring/statuses/116568288119537945</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/AwkwardTuring/statuses/116568288119537945</guid><dc:creator><![CDATA[awkwardturing@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 16:48:39 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Wed, 13 May 2026 16:40:25 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> wow another? nice</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.social/users/Viss/statuses/116568255715093600</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.social/users/Viss/statuses/116568255715093600</guid><dc:creator><![CDATA[viss@mastodon.social]]></dc:creator><pubDate>Wed, 13 May 2026 16:40:25 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Wed, 13 May 2026 16:38:59 GMT]]></title><description><![CDATA[<p>Are you losing track of the Linux LPEs these days?<br />Good.  Me too.</p><p>Here we have <a href="https://github.com/v12-security/pocs/tree/main/fragnesia" rel="nofollow noopener">fragnesia</a>.</p><p>It has been <a href="https://www.openwall.com/lists/oss-security/2026/05/13/5" rel="nofollow noopener">said</a> that <code>CVE-2026-46300 has been assigned for this issue</code>, except that it <a href="https://github.com/search?q=repo%3ACVEProject%2FcvelistV5%20CVE-2026-46300&amp;type=code" rel="nofollow noopener">hasn't</a>.  At least not yet.<br />And in case you don't yet believe that the Linux kernel's handling of CVEs is <strong>malicious compliance</strong>, note the wording of the CVE mention:</p><blockquote><p>For those that like to track these by CVE ids...</p></blockquote><p>Ubuntu (and Debian?) isn't affected, due to default AppArmor rules.</p><p>The same mitigation for Dirty Frag blocks this as well, so if you were on top of Dirty Frag protections, you don't need to worry about fragnesia.</p><pre><code>sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' &gt; /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2&gt;/dev/null; echo 3 &gt; /proc/sys/vm/drop_caches; true"<br /></code></pre>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/568/247/477/414/073/original/e625c09f15ecce24.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116568250110670506</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116568250110670506</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 16:38:59 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Wed, 13 May 2026 14:16:16 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> I thought so, but not asking means definitely a "no" answer <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f642.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title="(:" alt="🙂" /></p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.social/users/wiert/statuses/116567688921493322</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.social/users/wiert/statuses/116567688921493322</guid><dc:creator><![CDATA[wiert@mastodon.social]]></dc:creator><pubDate>Wed, 13 May 2026 14:16:16 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Wed, 13 May 2026 14:12:28 GMT]]></title><description><![CDATA[<p><span><a href="/user/wiert%40mastodon.social" rel="nofollow noopener">@<span>wiert</span></a></span> <br />Eh, sorry.  It's not past my threshold of caring enough at this point.  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f602.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--joy" style="height:23px;width:auto;vertical-align:middle" title="😂" alt="😂" /></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116567673932988022</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116567673932988022</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 14:12:28 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Wed, 13 May 2026 14:10:25 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> </p><p>(sorry, I thought I already had posted this one) </p><p>I tried multiple connections (we have two ISPs at home - hello redundancy) and sometimes it server side remembers the output language. Not sure why yet as I could not reliably reproduce this. This is intriguing. Any ideas?</p><p>//end (for now)</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.social/users/wiert/statuses/116567665884134354</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.social/users/wiert/statuses/116567665884134354</guid><dc:creator><![CDATA[wiert@mastodon.social]]></dc:creator><pubDate>Wed, 13 May 2026 14:10:25 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Tue, 12 May 2026 06:24:37 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> </p><p>I just compared these:</p><p>```<br />curl --verbose --cookie-jar - '<a href="https://ikotaslabs.com/news/2026-05-11?page=1&amp;lang-en" rel="nofollow noopener"><span>https://</span><span>ikotaslabs.com/news/2026-05-11</span><span>?page=1&amp;lang-en</span></a>'<br />curl --verbose --cookie-jar - '<a href="https://ikotaslabs.com/news/2026-05-11?lang-en" rel="nofollow noopener"><span>https://</span><span>ikotaslabs.com/news/2026-05-11</span><span>?lang-en</span></a>'<br />```</p><p>and</p><p>```<br />curl --verbose --cookie-jar - --cookie "lang=en" '<a href="https://ikotaslabs.com/news/2026-05-11?page=1" rel="nofollow noopener"><span>https://</span><span>ikotaslabs.com/news/2026-05-11</span><span>?page=1</span></a>'<br />```</p><p>The first two deliver Japanese returning cookie `lang=ja` ; the last one delivers English with a cookie `lang=en`.</p><p>All deliver `&lt;html lang="ja"&gt;` which is very odd for the second one.</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.social/users/wiert/statuses/116560171999955874</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.social/users/wiert/statuses/116560171999955874</guid><dc:creator><![CDATA[wiert@mastodon.social]]></dc:creator><pubDate>Tue, 12 May 2026 06:24:37 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Tue, 12 May 2026 06:24:13 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> </p><p>Odd indeed, and I still think it is caused by the `lang=en` request cookie being absent or present: the Mastodon preview cards are generated server side without sending cookies.</p><p>There is a good description of the Mastodon preview cards state of affairs at <a href="https://box464.com/posts/mastodon-preview-cards/" rel="nofollow noopener"><span>https://</span><span>box464.com/posts/mastodon-prev</span><span>iew-cards/</span></a></p><p>(I had to in-place edit `data-mode="dark"` in the html header into `data-mode="light"` to force it to become readable)</p><p>The preview request is at <a href="https://github.com/mastodon/mastodon/blob/main/app/services/fetch_link_card_service.rb#L56" rel="nofollow noopener"><span>https://</span><span>github.com/mastodon/mastodon/b</span><span>lob/main/app/services/fetch_link_card_service.rb#L56</span></a> (search for `Request.new`).</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.social/users/wiert/statuses/116560170447803155</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.social/users/wiert/statuses/116560170447803155</guid><dc:creator><![CDATA[wiert@mastodon.social]]></dc:creator><pubDate>Tue, 12 May 2026 06:24:13 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Mon, 11 May 2026 20:50:10 GMT]]></title><description><![CDATA[<p><span><a href="/user/wiert%40mastodon.social" rel="nofollow noopener">@<span>wiert</span></a></span> <br />Eh, I blame their web server.</p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/557/911/836/844/426/original/ba43d6e7f8b4e425.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116557913189594310</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116557913189594310</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Mon, 11 May 2026 20:50:10 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Mon, 11 May 2026 20:29:58 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> maybe it requests it once and without a lang=en cookie set?</p><p>The web is full of surprises, not limited to security vulnerabilities (;</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.social/users/wiert/statuses/116557833704525426</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.social/users/wiert/statuses/116557833704525426</guid><dc:creator><![CDATA[wiert@mastodon.social]]></dc:creator><pubDate>Mon, 11 May 2026 20:29:58 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Mon, 11 May 2026 20:18:29 GMT]]></title><description><![CDATA[<p><span><a href="/user/wiert%40mastodon.social" rel="nofollow noopener">@<span>wiert</span></a></span> <br />I mean, even Mastodon itself renders the link in your first reply as Japanese.  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f937.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--shrug" style="height:23px;width:auto;vertical-align:middle" title="🤷" alt="🤷" />‍<img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/2642.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--male_sign" style="height:23px;width:auto;vertical-align:middle" title="♂" alt="♂" />️</p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/557/787/241/436/563/original/6166cfa0ffabbd80.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116557788599835441</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116557788599835441</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Mon, 11 May 2026 20:18:29 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Mon, 11 May 2026 19:40:37 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span></p><p>That's a nice find.</p><p>Just tried in an incognito Window without Google Translate active but with JavaScript active.</p><p>- Japanese: <a href="https://ikotaslabs.com/news/2026-05-11?page=1" rel="nofollow noopener"><span>https://</span><span>ikotaslabs.com/news/2026-05-11</span><span>?page=1</span></a> <br />- English: <a href="https://ikotaslabs.com/news/2026-05-11?lang=en" rel="nofollow noopener"><span>https://</span><span>ikotaslabs.com/news/2026-05-11</span><span>?lang=en</span></a><br />- English as well: <a href="https://ikotaslabs.com/news/2026-05-11?page=1&amp;lang=en" rel="nofollow noopener"><span>https://</span><span>ikotaslabs.com/news/2026-05-11</span><span>?page=1&amp;lang=en</span></a><br />- English as well: <a href="https://ikotaslabs.com/news/2026-05-11?page=1" rel="nofollow noopener"><span>https://</span><span>ikotaslabs.com/news/2026-05-11</span><span>?page=1</span></a></p><p>I think it is setting a lang=en cookie the first time it encounters a lang=en parameter, but does not always return an English translated page unless the lang=en cookie is in the request.</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.social/users/wiert/statuses/116557639710210199</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.social/users/wiert/statuses/116557639710210199</guid><dc:creator><![CDATA[wiert@mastodon.social]]></dc:creator><pubDate>Mon, 11 May 2026 19:40:37 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Mon, 11 May 2026 18:28:16 GMT]]></title><description><![CDATA[<p><span><a href="/user/wiert%40mastodon.social" rel="nofollow noopener">@<span>wiert</span></a></span> <br />Is it though?</p><p>Interstingly if I get rid of the <code>page=1</code> part of your link, it works fine.</p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/557/350/293/254/988/original/cfdc9040fa5ac640.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116557355181516208</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116557355181516208</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Mon, 11 May 2026 18:28:16 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Mon, 11 May 2026 18:16:06 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> English version of that post: <a href="https://ikotaslabs.com/news/2026-05-11?page=1&amp;lang-en" rel="nofollow noopener"><span>https://</span><span>ikotaslabs.com/news/2026-05-11</span><span>?page=1&amp;lang-en</span></a></p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.social/users/wiert/statuses/116557307373021779</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.social/users/wiert/statuses/116557307373021779</guid><dc:creator><![CDATA[wiert@mastodon.social]]></dc:creator><pubDate>Mon, 11 May 2026 18:16:06 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Mon, 11 May 2026 15:54:03 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> Ok Siri, how do I temporarily disable the Linux kernel in general <img class="not-responsive emoji" src="https://media.infosec.exchange/infosec.exchange/custom_emojis/images/000/590/736/original/d2aeb1afe7e79f22.png" title=":neobot_evil_3c:" /></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/nyanbinary/statuses/116556748760220513</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/nyanbinary/statuses/116556748760220513</guid><dc:creator><![CDATA[nyanbinary@infosec.exchange]]></dc:creator><pubDate>Mon, 11 May 2026 15:54:03 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Mon, 11 May 2026 15:48:35 GMT]]></title><description><![CDATA[<p>And in case Dirty Frag wasn't unpatched enough for you, IKotas labs has <a href="https://ikotaslabs.com/news/2026-05-11?page=1" rel="nofollow noopener">found a new variant of Dirty Frag</a></p><p>So far, patches have only landed in today's Linux <a href="https://cdn.kernel.org/pub/linux/kernel/v7.x/ChangeLog-7.0.6" rel="nofollow noopener">7.0.6</a> and <a href="https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.18.29" rel="nofollow noopener">6.18.29</a>.</p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/556/725/576/453/677/original/05425d2dfa560a23.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116556727281568564</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116556727281568564</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Mon, 11 May 2026 15:48:35 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Sat, 09 May 2026 02:24:49 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> <span><a href="/user/lioh%40social.anoxinon.de">@<span>Lioh</span></a></span> I think that refers to the copy fail 2 release, which (from link in top post in this thread, repeated below) seems to be someone who reverse engineered one of the (dirty pipe) bugs from the upstream kernel fix and wrote it up (presumably originally assuming it was already fixed / shipped).</p><p>An “embargo” with patches in public is… always going to be fragile.  (Looks like “accidental duplicate find” here, because of first copy fail.)</p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://www.openwall.com/lists/oss-security/2026/05/07/12" title="oss-security - Copy Fail 2 / Dirty Frag — n-day from public commit, not embargo break">
<img src="https://www.openwall.com/logo.png" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://www.openwall.com/lists/oss-security/2026/05/07/12">
oss-security - Copy Fail 2 / Dirty Frag — n-day from public commit, not embargo break
</a>
</h5>
<p class="card-text line-clamp-3"></p>
</div>
<a href="https://www.openwall.com/lists/oss-security/2026/05/07/12" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://www.openwall.com/favicon.ico" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />



<p class="d-inline-block text-truncate mb-0"> <span class="text-secondary">(www.openwall.com)</span></p>
</a>
</div><p></p>]]></description><link>https://board.circlewithadot.net/post/https://cloudisland.nz/users/ewenmcneill/statuses/116542242096603572</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://cloudisland.nz/users/ewenmcneill/statuses/116542242096603572</guid><dc:creator><![CDATA[ewenmcneill@cloudisland.nz]]></dc:creator><pubDate>Sat, 09 May 2026 02:24:49 GMT</pubDate></item><item><title><![CDATA[Reply to The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure. on Fri, 08 May 2026 13:56:09 GMT]]></title><description><![CDATA[<p><span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> <span><a href="/user/troed%40swecyb.com">@<span>troed</span></a></span> <span><a href="https://mastodon.social/@wodny">@<span>wodny</span></a></span> there's so much less daylight than I thought between "a serious process for security professionals" and "oops all 0-day LPEs"</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.online/users/ferrix/statuses/116539298221773789</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.online/users/ferrix/statuses/116539298221773789</guid><dc:creator><![CDATA[ferrix@mastodon.online]]></dc:creator><pubDate>Fri, 08 May 2026 13:56:09 GMT</pubDate></item></channel></rss>