u/screaming-Snake-Case

▲ 58 r/de_EDV

Passend zum Feiertag: CVE-2026-46300 "Fragnesia"

Wieder eine local privilege escalation, und wieder nach praktisch dem gleichen Schema. Dieses mal haben wir sogar etwas Glück, denn die Mitigation für Dirtyfrag soll auch Fragnesia beheben. Habt ihr diese also bereits in production, so ist dieser Fall praktisch analog zu Dirtyfrag von letzter Woche und bereits mitigiert.

Leider ist der Patch für den Kernel noch in keinem offiziellem release.

Offizielles README von den security researchern + PoC

Weitere Infos kann man ganz gut dieser Mailinglist entnehmen: https://www.openwall.com/lists/oss-security/2026/05/13/3

Links zu verschienden security trackern der distros: [RedHat] - [Ubuntu] - [Debian]

reddit.com

Another week, another local privilege escalation - how did providers react?

Following up last weeks "Copy Fail" local privilege escalation, this time we got "Dirty Frag", essentially the same thing security wise.

This got me wondering about shared hosting as many seedboxes offer SSH access. I would assume the decent hosting providers use services like TuxCare or similar to live patch their systems as soon as a fix is available, but especially with this last one TuxCare likely didn't have a fix ready when the vulnerability was disclosed (embargo was broken early to inform the public as other actors also found the vulnerability before coordinated closure would have taken place).

This essentially means that anyone quick enough and with SSH access - assuming the seedbox providers use a somewhat typical / distro-provided kernel - would be able to elevate their shell to root and compromise the system.

Has anyone been informed by their provider about restricted SSH access, maybe even security-related downtime of the entire system or automatic migration to a fresh system as a result? In my view, this would be necessary as you likely otherwise couldn't be certain that no customer acting in bad faith has compromised the host system.

u/screaming-Snake-Case — 6 days ago
▲ 5 r/redhat

Hey all,

I am on the free developer subscription for individuals. Looking at the RedHat resources online I repeatedly find sentences like "Live kernel patch is supported for customers who have an active subscription.", so given I have a working subscription and the official repos are working fine, I should be able to install kernel live patches.

When I set up my server, I enabled live patching in the web console and thought I was done with it. After all I didn't get any errors.

Now given the recent copy-fail CVE with released PoC exploit and the just released Errata, I wanted to test if live patching worked and if my systems were already protected. To my surprise they weren't (which isn't a big deal as no one has SSH access to them, but still alarming). I took a look at the documentation to try and manually apply the live patch at least, but to my surprise my server cannot see any kpatch-patch-* packages.

# dnf search kpatch
Subscription Management Repositorys werden aktualisiert.
Letzte Prüfung auf abgelaufene Metadaten: vor 0:30:49 am Di 05 Mai 2026 06:44:27 CEST.
======================================================================================== Name exakte Treffer: kpatch =========================================================================================
kpatch.noarch : Dynamic kernel patch manager
=================================================================================== Name & Zusammenfassung Treffer: kpatch ===================================================================================
kpatch-dnf.noarch : kpatch-patch manager plugin for DNF

# kpatch list
Loaded patch modules:
Installed patch modules:

# subscription-manager status
+-------------------------------------------+
Systemstatusdetails
+-------------------------------------------+
Overall Status: Registered

What am I missing here? I am on the current minor RHEL 10.1, as per official documentation the current minor will get patches until the next one is released, but I can't see any even though I have an active subscription.

reddit.com
u/screaming-Snake-Case — 10 days ago