|
|
Message-ID: <20260521180641.GA29282@openwall.com> Date: Thu, 21 May 2026 20:06:41 +0200 From: Solar Designer <solar@...nwall.com> To: oss-security@...ts.openwall.com Cc: Hyunwoo Kim <imv4bel@...il.com>, Sultan Alsawaf <sultan@...neltoast.com> Subject: Re: Linux kernel: Dirty Frag variants — fix merged into netdev Hi, On Fri, May 22, 2026 at 02:19:42AM +0900, Hyunwoo Kim wrote: > With the help of several maintainers and developers, a v5 patch > resolving the "publicly disclosed" Dirty Frag variants other than the > CVE-2026-46300 (fragnesia) variant has been merged into netdev: > https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=48f6a5356a33dd78e7144ae1faef95ffc990aae0 > > Separately, the patch resolving CVE-2026-46300 alone has been split > into its own patch: > https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f84eca5817390257cef78013d0112481c503b4a3 Thank you very much Hyunwoo Kim for staying on top of this and focusing on fixing the issues. Such a contrast from what some others are doing. > This 48f6a5356a33 patch addresses four "publicly disclosed" variants: > > 1. https://lore.kernel.org/all/agRhFtawP06hWyRa@v4bel/ (2026-05-13) > 2. https://lore.kernel.org/all/agSx78pXBFCdn08p@v4bel/ (2026-05-13) > 3. https://lore.kernel.org/all/agVpIsaSherjHTYg@sultan-box/ (2026-05-14) Variant 3 above was found (and exploit generated) by Sultan Alsawaf, my colleague at CIQ, with use of "Claude Opus 4.6 (1M context)" with "hands tied since we didn't yet have the cybersecurity bypass." (the quotes are in Sultan's words) > 4. https://github.com/v12-security/pocs/tree/main/fragnesia-5db89c99566fc (2026-05-15) > > Note that the fourth PoC was confirmed to be blocked as well by the v3 > fix (skb_gro_receive) [1] that resolves the third PoC, This matches Sultan's analysis. It may be that the rediscovery by V12 was based on Sultan's public posting on the issue (including exploit). I called them out on this in their Twitter thread and got no reply. > and the v4 [2] and v5 [3] changes address potential issues. > > As long as the in-place path in esp remains, further variants of this > kind are expected to be found in the esp module. As mentioned > previously, I recommend keeping the mitigation in place for the time > being. As a maybe better mitigation, can we somehow make in-place / zero-copy runtime configurable, and not only for esp? > This patch has been verified against various selftests and stress > tests without issues, but it would be appreciated if distro > maintainers could additionally test whether this patch introduces any > regressions. > > > Best regards, > Hyunwoo Kim > > > [1]: https://lore.kernel.org/all/agW4vC0r8QOUKtRT@v4bel/ > [2]: https://lore.kernel.org/all/aga1VyHpHaUhnGZa@v4bel/ > [3]: https://lore.kernel.org/all/ageeJfJHwgzmKXbh@v4bel/ Thanks again, Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.