Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure.

The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure.

Scheduled Pinned Locked Moved Uncategorized
39 Posts 16 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • wiert@mastodon.socialW wiert@mastodon.social

    @wdormann

    Odd indeed, and I still think it is caused by the `lang=en` request cookie being absent or present: the Mastodon preview cards are generated server side without sending cookies.

    There is a good description of the Mastodon preview cards state of affairs at https://box464.com/posts/mastodon-preview-cards/

    (I had to in-place edit `data-mode="dark"` in the html header into `data-mode="light"` to force it to become readable)

    The preview request is at https://github.com/mastodon/mastodon/blob/main/app/services/fetch_link_card_service.rb#L56 (search for `Request.new`).

    wiert@mastodon.socialW This user is from outside of this forum
    wiert@mastodon.socialW This user is from outside of this forum
    wiert@mastodon.social
    wrote last edited by
    #27

    @wdormann

    I just compared these:

    ```
    curl --verbose --cookie-jar - 'https://ikotaslabs.com/news/2026-05-11?page=1&lang-en'
    curl --verbose --cookie-jar - 'https://ikotaslabs.com/news/2026-05-11?lang-en'
    ```

    and

    ```
    curl --verbose --cookie-jar - --cookie "lang=en" 'https://ikotaslabs.com/news/2026-05-11?page=1'
    ```

    The first two deliver Japanese returning cookie `lang=ja` ; the last one delivers English with a cookie `lang=en`.

    All deliver `<html lang="ja">` which is very odd for the second one.

    wiert@mastodon.socialW 1 Reply Last reply
    0
    • wiert@mastodon.socialW wiert@mastodon.social

      @wdormann

      I just compared these:

      ```
      curl --verbose --cookie-jar - 'https://ikotaslabs.com/news/2026-05-11?page=1&lang-en'
      curl --verbose --cookie-jar - 'https://ikotaslabs.com/news/2026-05-11?lang-en'
      ```

      and

      ```
      curl --verbose --cookie-jar - --cookie "lang=en" 'https://ikotaslabs.com/news/2026-05-11?page=1'
      ```

      The first two deliver Japanese returning cookie `lang=ja` ; the last one delivers English with a cookie `lang=en`.

      All deliver `<html lang="ja">` which is very odd for the second one.

      wiert@mastodon.socialW This user is from outside of this forum
      wiert@mastodon.socialW This user is from outside of this forum
      wiert@mastodon.social
      wrote last edited by
      #28

      @wdormann

      (sorry, I thought I already had posted this one)

      I tried multiple connections (we have two ISPs at home - hello redundancy) and sometimes it server side remembers the output language. Not sure why yet as I could not reliably reproduce this. This is intriguing. Any ideas?

      //end (for now)

      wdormann@infosec.exchangeW 1 Reply Last reply
      0
      • wiert@mastodon.socialW wiert@mastodon.social

        @wdormann

        (sorry, I thought I already had posted this one)

        I tried multiple connections (we have two ISPs at home - hello redundancy) and sometimes it server side remembers the output language. Not sure why yet as I could not reliably reproduce this. This is intriguing. Any ideas?

        //end (for now)

        wdormann@infosec.exchangeW This user is from outside of this forum
        wdormann@infosec.exchangeW This user is from outside of this forum
        wdormann@infosec.exchange
        wrote last edited by
        #29

        @wiert
        Eh, sorry. It's not past my threshold of caring enough at this point. πŸ˜‚

        wiert@mastodon.socialW 1 Reply Last reply
        1
        0
        • wdormann@infosec.exchangeW wdormann@infosec.exchange

          @wiert
          Eh, sorry. It's not past my threshold of caring enough at this point. πŸ˜‚

          wiert@mastodon.socialW This user is from outside of this forum
          wiert@mastodon.socialW This user is from outside of this forum
          wiert@mastodon.social
          wrote last edited by
          #30

          @wdormann I thought so, but not asking means definitely a "no" answer πŸ™‚

          1 Reply Last reply
          0
          • wdormann@infosec.exchangeW wdormann@infosec.exchange

            And in case Dirty Frag wasn't unpatched enough for you, IKotas labs has found a new variant of Dirty Frag

            So far, patches have only landed in today's Linux 7.0.6 and 6.18.29.

            wdormann@infosec.exchangeW This user is from outside of this forum
            wdormann@infosec.exchangeW This user is from outside of this forum
            wdormann@infosec.exchange
            wrote last edited by
            #31

            Are you losing track of the Linux LPEs these days?
            Good. Me too.

            Here we have fragnesia.

            It has been said that CVE-2026-46300 has been assigned for this issue, except that it hasn't. At least not yet.
            And in case you don't yet believe that the Linux kernel's handling of CVEs is malicious compliance, note the wording of the CVE mention:

            For those that like to track these by CVE ids...

            Ubuntu (and Debian?) isn't affected, due to default AppArmor rules.

            The same mitigation for Dirty Frag blocks this as well, so if you were on top of Dirty Frag protections, you don't need to worry about fragnesia.

            sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; echo 3 > /proc/sys/vm/drop_caches; true"
            Link Preview Image
            viss@mastodon.socialV awkwardturing@infosec.exchangeA hillu@infosec.exchangeH erlenmayr@chaos.socialE 4 Replies Last reply
            0
            • wdormann@infosec.exchangeW wdormann@infosec.exchange

              Are you losing track of the Linux LPEs these days?
              Good. Me too.

              Here we have fragnesia.

              It has been said that CVE-2026-46300 has been assigned for this issue, except that it hasn't. At least not yet.
              And in case you don't yet believe that the Linux kernel's handling of CVEs is malicious compliance, note the wording of the CVE mention:

              For those that like to track these by CVE ids...

              Ubuntu (and Debian?) isn't affected, due to default AppArmor rules.

              The same mitigation for Dirty Frag blocks this as well, so if you were on top of Dirty Frag protections, you don't need to worry about fragnesia.

              sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; echo 3 > /proc/sys/vm/drop_caches; true"
              Link Preview Image
              viss@mastodon.socialV This user is from outside of this forum
              viss@mastodon.socialV This user is from outside of this forum
              viss@mastodon.social
              wrote last edited by
              #32

              @wdormann wow another? nice

              1 Reply Last reply
              0
              • wdormann@infosec.exchangeW wdormann@infosec.exchange

                Are you losing track of the Linux LPEs these days?
                Good. Me too.

                Here we have fragnesia.

                It has been said that CVE-2026-46300 has been assigned for this issue, except that it hasn't. At least not yet.
                And in case you don't yet believe that the Linux kernel's handling of CVEs is malicious compliance, note the wording of the CVE mention:

                For those that like to track these by CVE ids...

                Ubuntu (and Debian?) isn't affected, due to default AppArmor rules.

                The same mitigation for Dirty Frag blocks this as well, so if you were on top of Dirty Frag protections, you don't need to worry about fragnesia.

                sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; echo 3 > /proc/sys/vm/drop_caches; true"
                Link Preview Image
                awkwardturing@infosec.exchangeA This user is from outside of this forum
                awkwardturing@infosec.exchangeA This user is from outside of this forum
                awkwardturing@infosec.exchange
                wrote last edited by
                #33

                @wdormann from GitHub: "This is a separate bug in the ESP/XFRM from dirtyfrag which has received its own patch. However, it is in the same surface and the mitigation is the same as for dirtyfrag."

                Curious phrasing. Does that mean the patch (not: the mitigation) will work for this as well or no?

                wdormann@infosec.exchangeW 1 Reply Last reply
                0
                • wdormann@infosec.exchangeW wdormann@infosec.exchange

                  Are you losing track of the Linux LPEs these days?
                  Good. Me too.

                  Here we have fragnesia.

                  It has been said that CVE-2026-46300 has been assigned for this issue, except that it hasn't. At least not yet.
                  And in case you don't yet believe that the Linux kernel's handling of CVEs is malicious compliance, note the wording of the CVE mention:

                  For those that like to track these by CVE ids...

                  Ubuntu (and Debian?) isn't affected, due to default AppArmor rules.

                  The same mitigation for Dirty Frag blocks this as well, so if you were on top of Dirty Frag protections, you don't need to worry about fragnesia.

                  sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; echo 3 > /proc/sys/vm/drop_caches; true"
                  Link Preview Image
                  hillu@infosec.exchangeH This user is from outside of this forum
                  hillu@infosec.exchangeH This user is from outside of this forum
                  hillu@infosec.exchange
                  wrote last edited by
                  #34

                  @wdormann oooooh, look at that shiny flickering ASCII animation. No AI-vuln-something marketing content here at all.

                  1 Reply Last reply
                  0
                  • awkwardturing@infosec.exchangeA awkwardturing@infosec.exchange

                    @wdormann from GitHub: "This is a separate bug in the ESP/XFRM from dirtyfrag which has received its own patch. However, it is in the same surface and the mitigation is the same as for dirtyfrag."

                    Curious phrasing. Does that mean the patch (not: the mitigation) will work for this as well or no?

                    wdormann@infosec.exchangeW This user is from outside of this forum
                    wdormann@infosec.exchangeW This user is from outside of this forum
                    wdormann@infosec.exchange
                    wrote last edited by
                    #35

                    @AwkwardTuring
                    Yes, the Dirty Frag mitigation works to protect against fragnesia CVE-2026-46300 as well.

                    Link Preview Image
                    awkwardturing@infosec.exchangeA 1 Reply Last reply
                    0
                    • wdormann@infosec.exchangeW wdormann@infosec.exchange

                      @AwkwardTuring
                      Yes, the Dirty Frag mitigation works to protect against fragnesia CVE-2026-46300 as well.

                      Link Preview Image
                      awkwardturing@infosec.exchangeA This user is from outside of this forum
                      awkwardturing@infosec.exchangeA This user is from outside of this forum
                      awkwardturing@infosec.exchange
                      wrote last edited by
                      #36

                      @wdormann misunderstanding πŸ™‚ I meant if dirty frag >patch< works for fragnesia

                      wdormann@infosec.exchangeW 1 Reply Last reply
                      0
                      • awkwardturing@infosec.exchangeA awkwardturing@infosec.exchange

                        @wdormann misunderstanding πŸ™‚ I meant if dirty frag >patch< works for fragnesia

                        wdormann@infosec.exchangeW This user is from outside of this forum
                        wdormann@infosec.exchangeW This user is from outside of this forum
                        wdormann@infosec.exchange
                        wrote last edited by
                        #37

                        @AwkwardTuring
                        Oh, sorry. I suppoi didn't read your message too carefully.
                        No, it's a separate patch, and therefore it should expected that the Dirty Frag patch does not fix fragnesia. The reasoning is that patches are precise, the mitigation for Dirty Frag is painted with a broad stroke (module level).

                        1 Reply Last reply
                        1
                        0
                        • wdormann@infosec.exchangeW wdormann@infosec.exchange

                          Are you losing track of the Linux LPEs these days?
                          Good. Me too.

                          Here we have fragnesia.

                          It has been said that CVE-2026-46300 has been assigned for this issue, except that it hasn't. At least not yet.
                          And in case you don't yet believe that the Linux kernel's handling of CVEs is malicious compliance, note the wording of the CVE mention:

                          For those that like to track these by CVE ids...

                          Ubuntu (and Debian?) isn't affected, due to default AppArmor rules.

                          The same mitigation for Dirty Frag blocks this as well, so if you were on top of Dirty Frag protections, you don't need to worry about fragnesia.

                          sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; echo 3 > /proc/sys/vm/drop_caches; true"
                          Link Preview Image
                          erlenmayr@chaos.socialE This user is from outside of this forum
                          erlenmayr@chaos.socialE This user is from outside of this forum
                          erlenmayr@chaos.social
                          wrote last edited by
                          #38

                          @wdormann https://security-tracker.debian.org/tracker/CVE-2026-46300

                          wdormann@infosec.exchangeW 1 Reply Last reply
                          0
                          • erlenmayr@chaos.socialE erlenmayr@chaos.social

                            @wdormann https://security-tracker.debian.org/tracker/CVE-2026-46300

                            wdormann@infosec.exchangeW This user is from outside of this forum
                            wdormann@infosec.exchangeW This user is from outside of this forum
                            wdormann@infosec.exchange
                            wrote last edited by
                            #39

                            @erlenmayr
                            Using / telling others a CVE ID before it actually exists is a choice, sure.

                            But is not the recommended way to use CVE.

                            1 Reply Last reply
                            1
                            0
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • World
                            • Users
                            • Groups