<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[https:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;1071719&#x2F;]]></title><description><![CDATA[<p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://lwn.net/Articles/1071719/" title="Dirty Frag: a zero-day universal Linux LPE">
<img src="https://static.lwn.net/images/logo/barepenguin-70.webp" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" />
</a>





<div class="card-body">
<h5 class="card-title">
<a href="https://lwn.net/Articles/1071719/">
Dirty Frag: a zero-day universal Linux LPE
</a>
</h5>
<p class="card-text line-clamp-3">Hyunwoo Kim has announced the Dirty Frag security flaw, a local-privilege-escalation (LPE) vuln [...]</p>
</div>
<a href="https://lwn.net/Articles/1071719/" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://static.lwn.net/images/favicon.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" />



<p class="d-inline-block text-truncate mb-0">LWN.net <span class="text-secondary">(lwn.net)</span></p>
</a>
</div></p><p><a href="https://milliways.social/tags/DirtyFrag" rel="tag">#<span>DirtyFrag</span></a>  is a broken embargo. </p><p>Local Privilege Escalation to root.</p><p>Public working exploit. No CVE assigned yet. </p><p>No fix in sight. <br />&lt;Edith&gt; 7.0.5 was just released which has a fix &lt;\Edith&gt;</p><p><a href="https://milliways.social/tags/infosec" rel="tag">#<span>infosec</span></a> <a href="https://milliways.social/tags/cyber" rel="tag">#<span>cyber</span></a> <a href="https://milliways.social/tags/tsunamiofvulns" rel="tag">#<span>tsunamiofvulns</span></a></p><p>This is the documentation &amp; exploit of DirtyFrag:<br /><a href="https://github.com/V4bel/dirtyfrag/blob/master/README.md" rel="nofollow noopener"><span>https://</span><span>github.com/V4bel/dirtyfrag/blo</span><span>b/master/README.md</span></a></p>

<div class="row mt-3"><img class="img-thumbnail" src="https://milliways.social/system/media_attachments/files/116/535/771/829/205/987/original/114fca02cf6c53b0.png" alt="Link Preview Image" /></div>]]></description><link>https://board.circlewithadot.net/topic/bf3aa504-4bdc-4166-ab06-514cc8b31809/https-lwn.net-articles-1071719</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 21:39:52 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/bf3aa504-4bdc-4166-ab06-514cc8b31809.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 07 May 2026 22:56:26 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to https:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;1071719&#x2F; on Fri, 08 May 2026 14:22:35 GMT]]></title><description><![CDATA[<p>and we have another one. This one with CVE. </p><p><a href="https://milliways.social/tags/dirtyfrag" rel="tag">#<span>dirtyfrag</span></a> <a href="https://milliways.social/tags/CVE" rel="tag">#<span>CVE</span></a>-2026-43500</p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://milliways.social/system/media_attachments/files/116/539/392/976/987/415/original/f03abdb578b3c3ef.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/post/https://milliways.social/users/mcfly/statuses/116539402216522711</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://milliways.social/users/mcfly/statuses/116539402216522711</guid><dc:creator><![CDATA[mcfly@milliways.social]]></dc:creator><pubDate>Fri, 08 May 2026 14:22:35 GMT</pubDate></item><item><title><![CDATA[Reply to https:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;1071719&#x2F; on Fri, 08 May 2026 09:12:18 GMT]]></title><description><![CDATA[<p><span><a href="https://milliways.social/@mcfly">@<span>mcfly</span></a></span> <span><a href="/user/miketango%40chaos.social">@<span>miketango</span></a></span> I guess that's the world we live in now. If fixes are open in the public eventually some vibe-kiddy just publishes an exploits.</p><p>But is it feasible keep the fixing work secret in projects like the linux kernel? I doubt. </p><p>In this times it really comes to light who has actually good security. Who can quickly apply mitigations and detection.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/securitym0nkey/statuses/116538182116773518</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/securitym0nkey/statuses/116538182116773518</guid><dc:creator><![CDATA[securitym0nkey@infosec.exchange]]></dc:creator><pubDate>Fri, 08 May 2026 09:12:18 GMT</pubDate></item><item><title><![CDATA[Reply to https:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;1071719&#x2F; on Fri, 08 May 2026 09:09:39 GMT]]></title><description><![CDATA[<p><span><a href="https://milliways.social/@mcfly">@<span>mcfly</span></a></span> are you sure? <a href="https://github.com/0xdeadbeefnetwork/Copy_Fail2-Electric_Boogaloo" rel="nofollow noopener"><span>https://</span><span>github.com/0xdeadbeefnetwork/C</span><span>opy_Fail2-Electric_Boogaloo</span></a> claims:<br />"Same bug exists in esp6_input and is not covered by the v4 fix f4c50a4034."</p>]]></description><link>https://board.circlewithadot.net/post/https://milliways.social/users/brabo/statuses/116538171677893386</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://milliways.social/users/brabo/statuses/116538171677893386</guid><dc:creator><![CDATA[brabo@milliways.social]]></dc:creator><pubDate>Fri, 08 May 2026 09:09:39 GMT</pubDate></item><item><title><![CDATA[Reply to https:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;1071719&#x2F; on Fri, 08 May 2026 07:44:29 GMT]]></title><description><![CDATA[<p><span><a href="https://milliways.social/@mcfly">@<span>mcfly</span></a></span> <span><a href="/user/miketango%40chaos.social">@<span>miketango</span></a></span> may they step on a Lego every day forever.</p>]]></description><link>https://board.circlewithadot.net/post/https://chaos.social/users/Laird_Dave/statuses/116537836798379231</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://chaos.social/users/Laird_Dave/statuses/116537836798379231</guid><dc:creator><![CDATA[laird_dave@chaos.social]]></dc:creator><pubDate>Fri, 08 May 2026 07:44:29 GMT</pubDate></item><item><title><![CDATA[Reply to https:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;1071719&#x2F; on Fri, 08 May 2026 07:43:08 GMT]]></title><description><![CDATA[<p><span><a href="/user/miketango%40chaos.social">@<span>miketango</span></a></span> from what I can read in the discussion is that someone saw the fix in the commit and asked a LLM too build an exploit and published that.</p><p>That someone was not aware of an embargo</p><p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f4c50a4034e62ab75f1d5cdd191dd5f9c77fdff4" title="xfrm: esp: avoid in-place decrypt on shared skb frags - kernel/git/netdev/net.git - Netdev Group's networking tree">
<img src="https://git.kernel.org/cgit-data/cgit.png" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f4c50a4034e62ab75f1d5cdd191dd5f9c77fdff4">
xfrm: esp: avoid in-place decrypt on shared skb frags - kernel/git/netdev/net.git - Netdev Group's networking tree
</a>
</h5>
<p class="card-text line-clamp-3"></p>
</div>
<a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f4c50a4034e62ab75f1d5cdd191dd5f9c77fdff4" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://git.kernel.org/favicon.ico" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" />



<p class="d-inline-block text-truncate mb-0"> <span class="text-secondary">(git.kernel.org)</span></p>
</a>
</div></p>]]></description><link>https://board.circlewithadot.net/post/https://milliways.social/users/mcfly/statuses/116537831478073740</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://milliways.social/users/mcfly/statuses/116537831478073740</guid><dc:creator><![CDATA[mcfly@milliways.social]]></dc:creator><pubDate>Fri, 08 May 2026 07:43:08 GMT</pubDate></item><item><title><![CDATA[Reply to https:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;1071719&#x2F; on Fri, 08 May 2026 07:28:40 GMT]]></title><description><![CDATA[<p><span><a href="https://milliways.social/@mcfly">@<span>mcfly</span></a></span> What do they mean by "embargo has been broken"? Someone just willy nilly published that exploit before the distro / kernel guys could react?</p>]]></description><link>https://board.circlewithadot.net/post/https://chaos.social/users/miketango/statuses/116537774634423377</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://chaos.social/users/miketango/statuses/116537774634423377</guid><dc:creator><![CDATA[miketango@chaos.social]]></dc:creator><pubDate>Fri, 08 May 2026 07:28:40 GMT</pubDate></item><item><title><![CDATA[Reply to https:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;1071719&#x2F; on Fri, 08 May 2026 07:20:28 GMT]]></title><description><![CDATA[<p>There seen to be a fix in commit <a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f4c50a4034e62ab75f1d5cdd191dd5f9c77fdff4" rel="nofollow noopener"><span>https://</span><span>git.kernel.org/pub/scm/linux/k</span><span>ernel/git/netdev/net.git/commit/?id=f4c50a4034e62ab75f1d5cdd191dd5f9c77fdff4</span></a> </p><p>That fix made it into 7.0.5 which was released 30 mins (?) ago</p><p><a href="https://cdn.kernel.org/pub/linux/kernel/v7.x/ChangeLog-7.0.5" rel="nofollow noopener"><span>https://</span><span>cdn.kernel.org/pub/linux/kerne</span><span>l/v7.x/ChangeLog-7.0.5</span></a> </p><p><a href="https://milliways.social/tags/dirtyfrag" rel="tag">#<span>dirtyfrag</span></a></p>]]></description><link>https://board.circlewithadot.net/post/https://milliways.social/users/mcfly/statuses/116537742363816320</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://milliways.social/users/mcfly/statuses/116537742363816320</guid><dc:creator><![CDATA[mcfly@milliways.social]]></dc:creator><pubDate>Fri, 08 May 2026 07:20:28 GMT</pubDate></item><item><title><![CDATA[Reply to https:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;1071719&#x2F; on Fri, 08 May 2026 00:05:29 GMT]]></title><description><![CDATA[<p><span><a href="/user/mcfly%40milliways.social">@<span>mcfly</span></a></span> </p><p>It's making for an interesting evening but there is a simple mitigation given in the github (as long as you don't actually need any of the three kernel modules it blocks from loading...)</p><p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://github.com/V4bel/dirtyfrag" title="GitHub - V4bel/dirtyfrag">
<img src="https://opengraph.githubassets.com/b385aadff8ec9cdcdcfa45e649d9cdb282280b59f8ee3291b4232fa04338b556/V4bel/dirtyfrag" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://github.com/V4bel/dirtyfrag">
GitHub - V4bel/dirtyfrag
</a>
</h5>
<p class="card-text line-clamp-3">Contribute to V4bel/dirtyfrag development by creating an account on GitHub.</p>
</div>
<a href="https://github.com/V4bel/dirtyfrag" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://github.githubassets.com/favicons/favicon.svg" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" />



<p class="d-inline-block text-truncate mb-0">GitHub <span class="text-secondary">(github.com)</span></p>
</a>
</div></p>]]></description><link>https://board.circlewithadot.net/post/https://domum.social/users/jon/statuses/116536031943594106</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://domum.social/users/jon/statuses/116536031943594106</guid><dc:creator><![CDATA[jon@domum.social]]></dc:creator><pubDate>Fri, 08 May 2026 00:05:29 GMT</pubDate></item></channel></rss>