Skip to content

[Bug]: Default kernel appears exposed to Dirty Frag xfrm-ESP attack surface #730

@6c67b9

Description

@6c67b9

I have done the following

  • I have searched the existing issues
  • If possible, I've reproduced the issue using the 'main' branch of this project

Steps to reproduce

https://github.com/V4bel/dirtyfrag

Current behavior

PoC is made for x86, but it successfully replaced binary files.

xfrm-ESP Page-Cache Write works in current version, but RxRPC Page-Cache Write doesn’t.

Relevant kernel config:

CONFIG_MODULES is not set
CONFIG_USER_NS=y
CONFIG_NET_NS=y
CONFIG_XFRM=y
CONFIG_XFRM_USER=y
CONFIG_XFRM_ESP=y
CONFIG_INET_ESP=y
# CONFIG_INET6_ESP is not set
# CONFIG_AF_RXRPC is not set

Expected behavior

Follow upstream patch as soon as it’s released.

Environment

- OS: Any
- Xcode: Any
- Swift: Any

Relevant log output

Namespace creation is allowed:

CONFIG_MODULES is not set
CONFIG_USER_NS=y
CONFIG_NET_NS=y
CONFIG_XFRM=y
CONFIG_XFRM_USER=y
CONFIG_XFRM_ESP=y
CONFIG_INET_ESP=y
# CONFIG_INET6_ESP is not set
# CONFIG_AF_RXRPC is not set

Namespace creation is allowed:

unshare -Urn true; echo $?
0

Code of Conduct

  • I agree to follow this project's Code of Conduct

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions