mirror of
https://github.com/V4bel/dirtyfrag.git
synced 2026-05-16 10:50:10 +00:00
update
This commit is contained in:
parent
8beafb186f
commit
5bb21af6dd
1 changed files with 6 additions and 8 deletions
14
README.md
14
README.md
|
|
@ -14,12 +14,11 @@ Dirty Frag is a case that extends the bug class to which [Dirty Pipe](https://di
|
||||||
|
|
||||||
For detailed technical information and the timeline, [see here](assets/write-up.md).
|
For detailed technical information and the timeline, [see here](assets/write-up.md).
|
||||||
|
|
||||||
Because the embargo has currently been broken, no patch or CVE exists. After consultation with the maintainers on linux-distros@vs.openwall.org and at their request, this Dirty Frag document is being published. For the disclosure timeline, refer to the technical details.
|
- `xfrm-ESP Page-Cache Write (CVE-2026-43284)` was patched in mainline [f4c50a4034e6](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4c50a4034e62ab75f1d5cdd191dd5f9c77fdff4).
|
||||||
|
- `RxRPC Page-Cache Write (CVE-2026-43500)` was patched in mainline [aa54b1d27fe0](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aa54b1d27fe0c2b78e664a34fd0fdf7cd1960d71).
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> **2026-05-08 Update:**
|
> At the time this document was first made public (2026-05-07), the embargo had been broken due to external factors, so no patch or CVE existed yet. After consultation with the maintainers on linux-distros@vs.openwall.org at that time, the Dirty Frag document was published at their request. For the disclosure timeline, refer to the technical details.
|
||||||
> - The `xfrm-ESP Page-Cache Write` vulnerability has been assigned **CVE-2026-43284** and patched in mainline at [f4c50a4034e6](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4c50a4034e62ab75f1d5cdd191dd5f9c77fdff4).
|
|
||||||
> - The `RxRPC Page-Cache Write` vulnerability has been reserved as **CVE-2026-43500** for tracking; no patch exists in any tree yet.
|
|
||||||
|
|
||||||
# Exploiting
|
# Exploiting
|
||||||
|
|
||||||
|
|
@ -44,7 +43,7 @@ or reboot the system.
|
||||||
# Affected Versions
|
# Affected Versions
|
||||||
|
|
||||||
- **CVE-2026-43284**: xfrm-ESP Page-Cache Write vulnerability is in scope from [cac2661c53f3 (2017-01-17)](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cac2661c53f3) up to [f4c50a4034e6 (2026-05-05)](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4c50a4034e62ab75f1d5cdd191dd5f9c77fdff4).
|
- **CVE-2026-43284**: xfrm-ESP Page-Cache Write vulnerability is in scope from [cac2661c53f3 (2017-01-17)](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cac2661c53f3) up to [f4c50a4034e6 (2026-05-05)](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4c50a4034e62ab75f1d5cdd191dd5f9c77fdff4).
|
||||||
- **CVE-2026-43500**: RxRPC Page-Cache Write vulnerability is in scope from [2dc334f1a63a (2023-06-08)](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2dc334f1a63a) up to upstream.
|
- **CVE-2026-43500**: RxRPC Page-Cache Write vulnerability is in scope from [2dc334f1a63a (2023-06-08)](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2dc334f1a63a) up to [aa54b1d27fe0 (2026-05-10)](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aa54b1d27fe0c2b78e664a34fd0fdf7cd1960d71).
|
||||||
|
|
||||||
In other words, the effective lifetime of the vulnerabilities is about 9 years.
|
In other words, the effective lifetime of the vulnerabilities is about 9 years.
|
||||||
|
|
||||||
|
|
@ -60,8 +59,7 @@ This Dirty Frag has been tested on the following distribution versions.
|
||||||
|
|
||||||
# Mitigation
|
# Mitigation
|
||||||
|
|
||||||
|
1. Use the following command to remove the modules in which the vulnerabilities occur and clear the page cache.
|
||||||
1. Because the responsible disclosure schedule and the embargo have been broken, no patch exists for any distribution. Use the following command to remove the modules in which the vulnerabilities occur and clear the page cache.
|
|
||||||
```bash
|
```bash
|
||||||
sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; echo 3 > /proc/sys/vm/drop_caches; true"
|
sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; echo 3 > /proc/sys/vm/drop_caches; true"
|
||||||
```
|
```
|
||||||
|
|
@ -88,4 +86,4 @@ Copy Fail was the motivation for starting this research. In particular, xfrm-ESP
|
||||||
|
|
||||||
## So, how do I fix my Linux?
|
## So, how do I fix my Linux?
|
||||||
|
|
||||||
Refer to the Mitigation and [Disclosure Timeline sections](assets/write-up.md). Due to external factors, the embargo has been broken, so no patch exists for any distribution.
|
Refer to the Mitigation section above.
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue