logoalt Hacker News

hughwyesterday at 11:05 PM2 repliesview on HN

Ran as a fresh new default user in a ubuntu:latest container

  git clone https://github.com/V4bel/dirtyfrag.git && cd dirtyfrag && gcc -O0 -Wall -o exp exp.c -lutil && ./exp
Result:

  dirtyfrag: failed (rc=3)
Good news!

Replies

stsewdtoday at 12:15 AM

I got the same running it inside a container, but got a shell when running it directly in the host. This only shows that the exploit doesn't work inside a container. So, containers aren't vulnerable, or the script needs some adjustments to make it work in containers.

Since copy fail can be used to escape containers (https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Kuber...), I'm guessing the exploit needs some changes only.

show 1 reply
Havoctoday at 12:01 AM

Wouldn't count on container being a reliable testing platform for this. Loads of stuff - legitimate or otherwise - fails in containers