Dirty Frag: Universal Linux LPE - proxmox vulnerable (in the wild already)

I'm not too worried about Proxmox, which out of the box has no user accounts besides root. I do worry about unprivileged containers: the exploit does switch from a user to root inside an unprivileged container. However, it does appear to be the fake root (id 100000). Are we safe or did I miss something?
 
fwiw the announcement looks quite suspicious w/o CVE assigned. Yep, they explained, but according to the timeline the moratory is already broken. So I'd rather avoid running exploit PoCs provided, or at least use a disposable VM for it.
The announcement author only has recent activity in their repo starting in March 2026. Absence of history doesn't look trustworthy either
 
Last edited:
fwiw the announcement looks quite suspicious w/o CVE assigned. Yep, they explained, but according to the timeline the moratory is already broken. So I'd rather avoid running exploit PoCs provided, or at least use a disposable VM for it.
The announcement author only has recent activity in their repo starting in March 2026. Absence of history doesn't look trustworthy either
the issue is legit, applying the mitigation (which looks almost identical to the one for the related recent copy.fail issue) is recommended until fixed kernels are available.
 
I'm not too worried about Proxmox, which out of the box has no user accounts besides root. I do worry about unprivileged containers: the exploit does switch from a user to root inside an unprivileged container. However, it does appear to be the fake root (id 100000). Are we safe or did I miss something?
it is currently unclear if this allows container escape from a standard, unprivileged container. the mitigation applies to containers as well in any case, since the kernel is shared.
 
The mitigation seems to blacklist 3 modules at once (esp4, esp6 & rxrpc). Can Proxmox confirm that it is safe to blacklist & rmmod these 3 modules?
afair, the first two mostly are for ipsec, so if you use it you probably need them. You can always check with `lsmod` if you have any of them loaded, and if not it's safe to block them
 
 
afair, the first two mostly are for ipsec, so if you use it you probably need them. You can always check with `lsmod` if you have any of them loaded, and if not it's safe to block them
yes, see the referenced advisory