@mhalano The rxrpc fix is yet to be merged into mainline

On the other hand, I wasn't able to use `./exp` to escalate from
"ubuntu" to root in my ubuntu:26.04 Docker container. That's a relief.
My `unshare` and `setpriv --no-new-privs` sandbox also prevented root
access, but `su` stopped asking for a password even when run outside the
sandbox, so I worry whether the exploit can corrupt a running process's
memory.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2151831

Title:
  Dirty Frag LPE security vulnerability

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kmod/+bug/2151831/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to