Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. https://lwn.net/Articles/1071719/

https://lwn.net/Articles/1071719/

Scheduled Pinned Locked Moved Uncategorized
infoseccybertsunamiofvulnsdirtyfrag
9 Posts 6 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • mcfly@milliways.socialM This user is from outside of this forum
    mcfly@milliways.socialM This user is from outside of this forum
    mcfly@milliways.social
    wrote last edited by
    #1

    Link Preview Image
    Dirty Frag: a zero-day universal Linux LPE

    Hyunwoo Kim has announced the Dirty Frag security flaw, a local-privilege-escalation (LPE) vuln [...]

    favicon

    LWN.net (lwn.net)

    #DirtyFrag is a broken embargo.

    Local Privilege Escalation to root.

    Public working exploit. No CVE assigned yet.

    No fix in sight.
    <Edith> 7.0.5 was just released which has a fix <\Edith>

    #infosec #cyber #tsunamiofvulns

    This is the documentation & exploit of DirtyFrag:
    https://github.com/V4bel/dirtyfrag/blob/master/README.md

    Link Preview Image
    jon@domum.socialJ mcfly@milliways.socialM 3 Replies Last reply
    0
    • mcfly@milliways.socialM mcfly@milliways.social

      Link Preview Image
      Dirty Frag: a zero-day universal Linux LPE

      Hyunwoo Kim has announced the Dirty Frag security flaw, a local-privilege-escalation (LPE) vuln [...]

      favicon

      LWN.net (lwn.net)

      #DirtyFrag is a broken embargo.

      Local Privilege Escalation to root.

      Public working exploit. No CVE assigned yet.

      No fix in sight.
      <Edith> 7.0.5 was just released which has a fix <\Edith>

      #infosec #cyber #tsunamiofvulns

      This is the documentation & exploit of DirtyFrag:
      https://github.com/V4bel/dirtyfrag/blob/master/README.md

      Link Preview Image
      jon@domum.socialJ This user is from outside of this forum
      jon@domum.socialJ This user is from outside of this forum
      jon@domum.social
      wrote last edited by
      #2

      @mcfly

      It's making for an interesting evening but there is a simple mitigation given in the github (as long as you don't actually need any of the three kernel modules it blocks from loading...)

      Link Preview Image
      GitHub - V4bel/dirtyfrag

      Contribute to V4bel/dirtyfrag development by creating an account on GitHub.

      favicon

      GitHub (github.com)

      1 Reply Last reply
      0
      • mcfly@milliways.socialM mcfly@milliways.social

        Link Preview Image
        Dirty Frag: a zero-day universal Linux LPE

        Hyunwoo Kim has announced the Dirty Frag security flaw, a local-privilege-escalation (LPE) vuln [...]

        favicon

        LWN.net (lwn.net)

        #DirtyFrag is a broken embargo.

        Local Privilege Escalation to root.

        Public working exploit. No CVE assigned yet.

        No fix in sight.
        <Edith> 7.0.5 was just released which has a fix <\Edith>

        #infosec #cyber #tsunamiofvulns

        This is the documentation & exploit of DirtyFrag:
        https://github.com/V4bel/dirtyfrag/blob/master/README.md

        Link Preview Image
        mcfly@milliways.socialM This user is from outside of this forum
        mcfly@milliways.socialM This user is from outside of this forum
        mcfly@milliways.social
        wrote last edited by
        #3

        There seen to be a fix in commit https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f4c50a4034e62ab75f1d5cdd191dd5f9c77fdff4

        That fix made it into 7.0.5 which was released 30 mins (?) ago

        https://cdn.kernel.org/pub/linux/kernel/v7.x/ChangeLog-7.0.5

        #dirtyfrag

        miketango@chaos.socialM brabo@milliways.socialB 2 Replies Last reply
        0
        • mcfly@milliways.socialM mcfly@milliways.social

          There seen to be a fix in commit https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f4c50a4034e62ab75f1d5cdd191dd5f9c77fdff4

          That fix made it into 7.0.5 which was released 30 mins (?) ago

          https://cdn.kernel.org/pub/linux/kernel/v7.x/ChangeLog-7.0.5

          #dirtyfrag

          miketango@chaos.socialM This user is from outside of this forum
          miketango@chaos.socialM This user is from outside of this forum
          miketango@chaos.social
          wrote last edited by
          #4

          @mcfly What do they mean by "embargo has been broken"? Someone just willy nilly published that exploit before the distro / kernel guys could react?

          mcfly@milliways.socialM 1 Reply Last reply
          0
          • miketango@chaos.socialM miketango@chaos.social

            @mcfly What do they mean by "embargo has been broken"? Someone just willy nilly published that exploit before the distro / kernel guys could react?

            mcfly@milliways.socialM This user is from outside of this forum
            mcfly@milliways.socialM This user is from outside of this forum
            mcfly@milliways.social
            wrote last edited by
            #5

            @miketango from what I can read in the discussion is that someone saw the fix in the commit and asked a LLM too build an exploit and published that.

            That someone was not aware of an embargo

            Link Preview Image
            xfrm: esp: avoid in-place decrypt on shared skb frags - kernel/git/netdev/net.git - Netdev Group's networking tree

            favicon

            (git.kernel.org)

            laird_dave@chaos.socialL securitym0nkey@infosec.exchangeS 2 Replies Last reply
            0
            • mcfly@milliways.socialM mcfly@milliways.social

              @miketango from what I can read in the discussion is that someone saw the fix in the commit and asked a LLM too build an exploit and published that.

              That someone was not aware of an embargo

              Link Preview Image
              xfrm: esp: avoid in-place decrypt on shared skb frags - kernel/git/netdev/net.git - Netdev Group's networking tree

              favicon

              (git.kernel.org)

              laird_dave@chaos.socialL This user is from outside of this forum
              laird_dave@chaos.socialL This user is from outside of this forum
              laird_dave@chaos.social
              wrote last edited by
              #6

              @mcfly @miketango may they step on a Lego every day forever.

              1 Reply Last reply
              0
              • mcfly@milliways.socialM mcfly@milliways.social

                There seen to be a fix in commit https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f4c50a4034e62ab75f1d5cdd191dd5f9c77fdff4

                That fix made it into 7.0.5 which was released 30 mins (?) ago

                https://cdn.kernel.org/pub/linux/kernel/v7.x/ChangeLog-7.0.5

                #dirtyfrag

                brabo@milliways.socialB This user is from outside of this forum
                brabo@milliways.socialB This user is from outside of this forum
                brabo@milliways.social
                wrote last edited by
                #7

                @mcfly are you sure? https://github.com/0xdeadbeefnetwork/Copy_Fail2-Electric_Boogaloo claims:
                "Same bug exists in esp6_input and is not covered by the v4 fix f4c50a4034."

                1 Reply Last reply
                0
                • mcfly@milliways.socialM mcfly@milliways.social

                  @miketango from what I can read in the discussion is that someone saw the fix in the commit and asked a LLM too build an exploit and published that.

                  That someone was not aware of an embargo

                  Link Preview Image
                  xfrm: esp: avoid in-place decrypt on shared skb frags - kernel/git/netdev/net.git - Netdev Group's networking tree

                  favicon

                  (git.kernel.org)

                  securitym0nkey@infosec.exchangeS This user is from outside of this forum
                  securitym0nkey@infosec.exchangeS This user is from outside of this forum
                  securitym0nkey@infosec.exchange
                  wrote last edited by
                  #8

                  @mcfly @miketango I guess that's the world we live in now. If fixes are open in the public eventually some vibe-kiddy just publishes an exploits.

                  But is it feasible keep the fixing work secret in projects like the linux kernel? I doubt.

                  In this times it really comes to light who has actually good security. Who can quickly apply mitigations and detection.

                  1 Reply Last reply
                  1
                  0
                  • R relay@relay.infosec.exchange shared this topic
                  • mcfly@milliways.socialM mcfly@milliways.social

                    Link Preview Image
                    Dirty Frag: a zero-day universal Linux LPE

                    Hyunwoo Kim has announced the Dirty Frag security flaw, a local-privilege-escalation (LPE) vuln [...]

                    favicon

                    LWN.net (lwn.net)

                    #DirtyFrag is a broken embargo.

                    Local Privilege Escalation to root.

                    Public working exploit. No CVE assigned yet.

                    No fix in sight.
                    <Edith> 7.0.5 was just released which has a fix <\Edith>

                    #infosec #cyber #tsunamiofvulns

                    This is the documentation & exploit of DirtyFrag:
                    https://github.com/V4bel/dirtyfrag/blob/master/README.md

                    Link Preview Image
                    mcfly@milliways.socialM This user is from outside of this forum
                    mcfly@milliways.socialM This user is from outside of this forum
                    mcfly@milliways.social
                    wrote last edited by
                    #9

                    and we have another one. This one with CVE.

                    #dirtyfrag #CVE-2026-43500

                    Link Preview Image
                    1 Reply Last reply
                    1
                    0
                    Reply
                    • Reply as topic
                    Log in to reply
                    • Oldest to Newest
                    • Newest to Oldest
                    • Most Votes


                    • Login

                    • Login or register to search.
                    • First post
                      Last post
                    0
                    • Categories
                    • Recent
                    • Tags
                    • Popular
                    • World
                    • Users
                    • Groups