Hacker News
Fragnesia Made Public as Latest Linux Local Privilege Escalation Vulnerability
gnufx
|next
[-]
bestouff
|next
|previous
[-]
INTPenis
|root
|parent
|next
[-]
zahlman
|root
|parent
|next
|previous
[-]
LPEs also potentially make user-level malware into system-level malware, which is only marginally more impactful for a single person on a desktop, but considerably harder to clean up. (It also broadens the range of what such malware could exfiltrate from me.)
dathinab
|root
|parent
|next
|previous
[-]
not relevant IMHO
we don't live anymore in a time where you can trust that local apps do not misbehave, and in such a context LPE is pretty bad even in a single user system
just thing about all the supply chain problems of recent times
riedel
|root
|parent
|next
|previous
[-]
gnufx
|root
|parent
[-]
There are also things like the extensive high energy physics WLCG compute federation, which is somewhat different, but can potentially be compromised quickly at large scale. For the original copy-fail we didn't want to drain our WLCG Alma9 cluster, or just kill all the jobs like the university HPC system. We got eBPF mitigation in place within a couple of hours, relieved the exploit signature wasn't in logs from the night before. That would have been done earlier if Proofpoint hadn't bounced the forwarded oss-security article as "contains malware"; sigh.
jovial_cavalier
|root
|parent
|previous
[-]
nubinetwork
|next
|previous
[-]
itintheory
|next
|previous
[-]
chasil
|root
|parent
[-]
$ cat /etc/modprobe.d/dirtyfrag.conf
install esp4 /bin/false
install esp6 /bin/false
install rxrpc /bin/false
Are those correct for this exploit?https://access.redhat.com/security/vulnerabilities/RHSB-2026...
itintheory
|root
|parent
|next
[-]
https://aws.amazon.com/security/security-bulletins/2026-027-...
That one also includes disabling user namespaces. Could be problematic if they're in use.