<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Apparently there&#x27;s yet another #LinuxKernel Local Privilege Escalation #vulnerability.]]></title><description><![CDATA[<p>Apparently there's yet another <a href="https://infosec.exchange/tags/LinuxKernel" rel="tag">#<span>LinuxKernel</span></a> Local Privilege Escalation <a href="https://infosec.exchange/tags/vulnerability" rel="tag">#<span>vulnerability</span></a>. There's a mitigation that disables esp4, esp6 and rxrpc modules.</p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://www.openwall.com/lists/oss-security/2026/05/07/8" title="oss-security - Dirty Frag: Universal Linux LPE">
<img src="https://www.openwall.com/logo.png" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://www.openwall.com/lists/oss-security/2026/05/07/8">
oss-security - Dirty Frag: Universal Linux LPE
</a>
</h5>
<p class="card-text line-clamp-3"></p>
</div>
<a href="https://www.openwall.com/lists/oss-security/2026/05/07/8" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://www.openwall.com/favicon.ico" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />



<p class="d-inline-block text-truncate mb-0"> <span class="text-secondary">(www.openwall.com)</span></p>
</a>
</div><p></p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://github.com/V4bel/dirtyfrag" title="GitHub - V4bel/dirtyfrag">
<img src="https://opengraph.githubassets.com/a740c7563bcd90bd06f4c56752d000a2a31b6dc56685dc064b0f981f460b044d/V4bel/dirtyfrag" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://github.com/V4bel/dirtyfrag">
GitHub - V4bel/dirtyfrag
</a>
</h5>
<p class="card-text line-clamp-3">Contribute to V4bel/dirtyfrag development by creating an account on GitHub.</p>
</div>
<a href="https://github.com/V4bel/dirtyfrag" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://github.githubassets.com/favicons/favicon.svg" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />



<p class="d-inline-block text-truncate mb-0">GitHub <span class="text-secondary">(github.com)</span></p>
</a>
</div><p></p><p>EDIT: The related vulnerabilities are now tracked as CVE-2026-43284 and CVE-2026-43500. <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-43284" rel="nofollow noopener"><span>https://</span><span>nvd.nist.gov/vuln/detail/CVE-2</span><span>026-43284</span></a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-43500" rel="nofollow noopener"><span>https://</span><span>nvd.nist.gov/vuln/detail/CVE-2</span><span>026-43500</span></a> </p><p><a href="https://infosec.exchange/tags/infosec" rel="tag">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" rel="tag">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/CVE_2026_43284" rel="tag">#<span>CVE_2026_43284</span></a> <a href="https://infosec.exchange/tags/CVE_2026_43500" rel="tag">#<span>CVE_2026_43500</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/e4a4f600-38d3-4e94-a30e-b66c89e78aa2/apparently-there-s-yet-another-linuxkernel-local-privilege-escalation-vulnerability.</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 21:39:47 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/e4a4f600-38d3-4e94-a30e-b66c89e78aa2.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 07 May 2026 19:56:41 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Apparently there&#x27;s yet another #LinuxKernel Local Privilege Escalation #vulnerability. on Fri, 08 May 2026 09:59:32 GMT]]></title><description><![CDATA[<p><span><a href="/user/harrysintonen%40infosec.exchange">@<span>harrysintonen</span></a></span> yesterday I read that one should not drop caches in a production system. I don’t know if that recommendation was just for performance or if all hell could break loose.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/LabanSkoller/statuses/116538367816301702</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/LabanSkoller/statuses/116538367816301702</guid><dc:creator><![CDATA[labanskoller@infosec.exchange]]></dc:creator><pubDate>Fri, 08 May 2026 09:59:32 GMT</pubDate></item><item><title><![CDATA[Reply to Apparently there&#x27;s yet another #LinuxKernel Local Privilege Escalation #vulnerability. on Fri, 08 May 2026 08:47:52 GMT]]></title><description><![CDATA[<p><span><a href="/user/christopherkunz%40chaos.social">@<span>christopherkunz</span></a></span> Sure if you executed that particular exploit you definitely must restore the /etc/passwd afterwards.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/harrysintonen/statuses/116538086011994841</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/harrysintonen/statuses/116538086011994841</guid><dc:creator><![CDATA[harrysintonen@infosec.exchange]]></dc:creator><pubDate>Fri, 08 May 2026 08:47:52 GMT</pubDate></item><item><title><![CDATA[Reply to Apparently there&#x27;s yet another #LinuxKernel Local Privilege Escalation #vulnerability. on Fri, 08 May 2026 08:01:31 GMT]]></title><description><![CDATA[<p><span><a href="/user/harrysintonen%40infosec.exchange">@<span>harrysintonen</span></a></span> In addition to Dirtyfrag, there there's Copy Fail 2 - Electric Boogaloo. <a href="https://github.com/0xdeadbeefnetwork/Copy_Fail2-Electric_Boogaloo" rel="nofollow noopener"><span>https://</span><span>github.com/0xdeadbeefnetwork/C</span><span>opy_Fail2-Electric_Boogaloo</span></a> This sets up an ESP interface and exploits a bug in the ESP-in-UDP code. <br />Same here, probably prudent to drop caches (restart networking?) and remove the uid0 entry from /etc/passwd</p>]]></description><link>https://board.circlewithadot.net/post/https://chaos.social/users/christopherkunz/statuses/116537903790811856</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://chaos.social/users/christopherkunz/statuses/116537903790811856</guid><dc:creator><![CDATA[christopherkunz@chaos.social]]></dc:creator><pubDate>Fri, 08 May 2026 08:01:31 GMT</pubDate></item><item><title><![CDATA[Reply to Apparently there&#x27;s yet another #LinuxKernel Local Privilege Escalation #vulnerability. on Fri, 08 May 2026 07:53:32 GMT]]></title><description><![CDATA[<p>Note that if you tested the exploit locally and then applied the workaround your system will retain the tampered kernel cache and will remain vulnerable even when the module is no longer in memory and cannot no longer be loaded.</p><p>You can use sudo sh -c "echo 3 &gt; /proc/sys/vm/drop_caches" to flush the exploit from memory. Rebooting will also work, of course.</p><p>EDIT: Needless to say you should not execute random exploits in any important system. Always use a dedicated VM you can wipe after testing.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/harrysintonen/statuses/116537872415175248</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/harrysintonen/statuses/116537872415175248</guid><dc:creator><![CDATA[harrysintonen@infosec.exchange]]></dc:creator><pubDate>Fri, 08 May 2026 07:53:32 GMT</pubDate></item><item><title><![CDATA[Reply to Apparently there&#x27;s yet another #LinuxKernel Local Privilege Escalation #vulnerability. on Thu, 07 May 2026 20:21:32 GMT]]></title><description><![CDATA[<p><span><a href="/user/gtsadmin%40wiseowl.club">@<span>gtsadmin</span></a></span> They will be loaded by the kernel automatically on demand. So apply the mitigation until kernel update is available.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/harrysintonen/statuses/116535151358192923</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/harrysintonen/statuses/116535151358192923</guid><dc:creator><![CDATA[harrysintonen@infosec.exchange]]></dc:creator><pubDate>Thu, 07 May 2026 20:21:32 GMT</pubDate></item><item><title><![CDATA[Reply to Apparently there&#x27;s yet another #LinuxKernel Local Privilege Escalation #vulnerability. on Thu, 07 May 2026 20:20:46 GMT]]></title><description><![CDATA[<p><span><a href="/user/harrysintonen%40infosec.exchange" rel="nofollow noreferrer noopener">@<span>harrysintonen</span></a></span> None of my <a href="https://wiseowl.club/tags/debian" rel="tag nofollow noreferrer noopener">#<span>Debian</span></a> <a href="https://wiseowl.club/tags/linux" rel="tag nofollow noreferrer noopener">#<span>linux</span></a> boxen have those kernel modules loaded:<br />sudo lsmod | egrep "esp4|esp6|rxrpc"<br /><a href="https://wiseowl.club/tags/infosec" rel="tag nofollow noreferrer noopener">#<span>InfoSec</span></a></p>]]></description><link>https://board.circlewithadot.net/post/https://wiseowl.club/users/gtsadmin/statuses/01KR21K5YRESA5FKWW0H52CAMS</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://wiseowl.club/users/gtsadmin/statuses/01KR21K5YRESA5FKWW0H52CAMS</guid><dc:creator><![CDATA[gtsadmin@wiseowl.club]]></dc:creator><pubDate>Thu, 07 May 2026 20:20:46 GMT</pubDate></item></channel></rss>