@mhalano The rxrpc fix is yet to be merged into mainline On the other hand, I wasn't able to use `./exp` to escalate from "ubuntu" to root in my ubuntu:26.04 Docker container. That's a relief. My `unshare` and `setpriv --no-new-privs` sandbox also prevented root access, but `su` stopped asking for a password even when run outside the sandbox, so I worry whether the exploit can corrupt a running process's memory.
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2151831 Title: Dirty Frag LPE security vulnerability To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kmod/+bug/2151831/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
