‘Dirty Frag’ Linux flaw one-ups CopyFail with no patches and public root exploit

Security

Broken disclosure embargo left admins facing a fresh root-level flaw with no CVE

A fresh Linux privilege escalation bug dubbed “Dirty Frag” has dropped into the wild with no patches, no CVE, and a public exploit that hands attackers root access across major distributions.

Security researcher Hyunwoo Kim disclosed the local privilege escalation flaw on Friday after what he said was a broken embargo forced the issue into the open. 

Kim described Dirty Frag as a “universal LPE” affecting “all major distributions” and warned that it delivers the same kind of immediate root access as the recent CopyFail mess – only this time, defenders do not even have patches to throw at the problem.

“As with the previous Copy Fail vulnerability, Dirty Frag likewise allows immediate root privilege escalation on all major distributions,” Kim said. “Because the responsible disclosure schedule and embargo have been broken, no patches exist for any distribution.”

Dirty Frag works by chaining together two separate Linux kernel flaws. One sits in the xfrm-ESP subsystem and dates back to a January 2017 kernel commit, according to Kim, while the second vulnerability affects RxRPC functionality introduced in 2023.

Together, the two bugs allegedly let unprivileged local users overwrite protected files in memory and claw their way to root. A long list of distributions in the firing line, according to Kim, including Ubuntu, Red Hat Enterprise Linux, CentOS Stream, Fedora, AlmaLinux, and openSUSE Tumbleweed.

Separately, researchers appear to have independently reverse-engineered part of the bug chain from a publicly visible kernel fix commit before the embargo expired, adding to the disclosure mess already surrounding the flaw. One GitHub project titled “Copy Fail 2: Electric Boogaloo” claims to weaponize the ESP/xfrm side of the issue separately from Kim’s full Dirty Frag chain.

Kim said maintainers signed off on the disclosure of the flaw after somebody else dumped exploit details online first, collapsing the embargo before patches were finished. So now the exploit is public, the fixes are not, and Linux admins get another long week.

The disclosure comes as the industry is still dealing with the fallout from CopyFail, another Linux privilege escalation bug that recently landed in CISA’s Known Exploited Vulnerabilities catalog after attackers started cashing in on it in the wild.

But Dirty Frag makes the recent CopyFail chaos look relatively organized. There’s still no CVE, no coordinated patch rollout, and not much in the way of mitigation.

Kim published a temporary workaround that disables affected ESP and RxRPC modules before clearing the system page cache. Useful, perhaps, although “turn bits of the kernel off and hope for the best” is not usually the sort of guidance admins enjoy seeing. ®

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *