<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Linux 内核高危零日漏洞 Dirty Frag 公开利用代码，禁令被破无补丁可用]]></title><description><![CDATA[<p dir="auto">韩国安全研究员 Hyunwoo Kim（@v4bel）于北京时间 5 月 8 日凌晨在 oss-security 邮件列表正式披露 Linux 内核本地提权（LPE）漏洞 Dirty Frag，同步发布概念验证（PoC）利用代码。该漏洞通过链式组合两个独立缺陷实现普通用户一步提权至 root：其一为 xfrm-ESP Page-Cache Write，利用 IPsec ESP 快速解密路径在 splice()/sendfile() 注入的外部页面上直接操作，提供强力的任意 4 字节写原语；其二为 RxRPC Page-Cache Write，无需命名空间创建权限。两者互补盲区——前者可绕过 Ubuntu 的 AppArmor 限制，后者则针对默认加载 rxrpc.ko 的 Ubuntu 环境——组合后可在所有主流发行版上实现完整利用。该漏洞属于 Dirty Pipe（CVE-2022-0847）与 Copy Fail（CVE-2026-31431）同类缺陷的延伸，为确定性逻辑漏洞，无需竞争条件，失败时内核不崩溃，成功率极高。xfrm-ESP 漏洞影响范围可追溯至 2017 年 1 月（Linux 4.14 前后），存续近 9 年；受影响发行版涵盖 Ubuntu 18.04–24.04、RHEL/AlmaLinux 8–10、Fedora 44、openSUSE Tumbleweed、CentOS Stream 10、Debian 10–13 等全线主流版本。</p>
<p dir="auto">本次披露属于禁令被破后的被动公开：Kim 原定于 5 月 12 日协调性披露，但不明第三方提前泄露，迫使其在 linux-distros 维护者建议下提前发布完整信息。目前尚无任何发行版的官方补丁，亦未分配 CVE 编号；上游内核已有针对 ESP 的修复提交进入 netdev 树，rxrpc 补丁亦在 netdev 邮件列表流转，AlmaLinux 已率先发布测试版修复内核。临时缓解措施为卸载并禁用 esp4、esp6、rxrpc 三个内核模块，但将导致 IPsec 与 kAFS 功能失效，不适用于依赖这些功能的生产环境。</p>
<p dir="auto"><a href="https://github.com/V4bel/dirtyfrag" target="_blank" rel="noopener noreferrer nofollow ugc">GitHub</a> | <a href="https://lwn.net/Articles/1071719/" target="_blank" rel="noopener noreferrer nofollow ugc">LWN.net</a> | <a href="https://almalinux.org/blog/2026-05-07-dirty-frag/" target="_blank" rel="noopener noreferrer nofollow ugc">AlmaLinux</a></p>
<p dir="auto"><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://github.com/V4bel/dirtyfrag" title="GitHub - V4bel/dirtyfrag">
<img src="https://opengraph.githubassets.com/ba02599293413096fa0f2055db78950d251da295983d1073c9fdf681bf964c3a/V4bel/dirtyfrag" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" onerror="this.parentElement.remove()" />
</a>



<div class="card-body">
<h5 class="card-title">
<a class="text-decoration-none" href="https://github.com/V4bel/dirtyfrag">
GitHub - V4bel/dirtyfrag
</a>
</h5>
<p class="card-text line-clamp-3">Contribute to V4bel/dirtyfrag development by creating an account on GitHub.</p>
</div>
<a href="https://github.com/V4bel/dirtyfrag" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://github.githubassets.com/favicons/favicon.svg" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" onerror="this.remove()"/>



<p class="d-inline-block text-truncate mb-0">GitHub <span class="text-secondary">(github.com)</span></p>
</a>
</div></p>
<p dir="auto"><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://lwn.net/Articles/1071719/" title="Dirty Frag: a zero-day universal Linux LPE">
<img src="https://static.lwn.net/images/logo/barepenguin-70.webp" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" onerror="this.parentElement.remove()" />
</a>





<div class="card-body">
<h5 class="card-title">
<a class="text-decoration-none" href="https://lwn.net/Articles/1071719/">
Dirty Frag: a zero-day universal Linux LPE
</a>
</h5>
<p class="card-text line-clamp-3">Hyunwoo Kim has announced the Dirty Frag security flaw, a local-privilege-escalation (LPE) vuln [...]</p>
</div>
<a href="https://lwn.net/Articles/1071719/" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://static.lwn.net/images/favicon.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" onerror="this.remove()"/>



<p class="d-inline-block text-truncate mb-0">LWN.net <span class="text-secondary">(lwn.net)</span></p>
</a>
</div></p>
<p dir="auto"><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://almalinux.org/blog/2026-05-07-dirty-frag/" title="Dirty Frag (CVE-2026-43284, CVE-2026-43500) Patches Released">
<img src="https://almalinux.org/blog-images/2026/2026-05-07-dirty-frag.png" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" onerror="this.parentElement.remove()" />
</a>



<div class="card-body">
<h5 class="card-title">
<a class="text-decoration-none" href="https://almalinux.org/blog/2026-05-07-dirty-frag/">
Dirty Frag (CVE-2026-43284, CVE-2026-43500) Patches Released
</a>
</h5>
<p class="card-text line-clamp-3">
    An Open Source, community owned and governed, forever-free enterprise Linux distribution.</p>
</div>
<a href="https://almalinux.org/blog/2026-05-07-dirty-frag/" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://almalinux.org/fav/favicon-32x32.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" onerror="this.remove()"/>









<p class="d-inline-block text-truncate mb-0">AlmaLinux OS <span class="text-secondary">(almalinux.org)</span></p>
</a>
</div></p>
]]></description><link>https://welinux.com//topic/246/linux-内核高危零日漏洞-dirty-frag-公开利用代码-禁令被破无补丁可用</link><generator>RSS for Node</generator><lastBuildDate>Mon, 18 May 2026 20:38:53 GMT</lastBuildDate><atom:link href="https://welinux.com//topic/246.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 08 May 2026 05:19:41 GMT</pubDate><ttl>60</ttl></channel></rss>