Windows Version
Microsoft Windows [Version 10.0.26200.8246]
WSL Version
WSL version: 2.6.3.0
Are you using WSL 1 or WSL 2?
Kernel Version
Kernel version: 6.6.87.2-1
Distro Version
Ubuntu 24.04, 26.04
Other Software
No response
Repro Steps
Security error, same as CVE-2026-31431
Allows you to get root access on a local machine. The error comes from an unpatched Kernel module's - xfrm-ESP and RxRPC.
The code is publicly available in projects:
- https://github.com/V4bel/dirtyfrag
- https://github.com/0xdeadbeefnetwork/Copy_Fail2-Electric_Boogaloo
Steps:
- Run ./run.sh from second repo.
Expected Behavior
Error and no root access (with a rebuilt kernel without an error module, the exploit produces the expected result - on a standard WSL kernel, no).
Actual Behavior
I'm getting root access.
Diagnostic Logs
No response
Windows Version
Microsoft Windows [Version 10.0.26200.8246]
WSL Version
WSL version: 2.6.3.0
Are you using WSL 1 or WSL 2?
Kernel Version
Kernel version: 6.6.87.2-1
Distro Version
Ubuntu 24.04, 26.04
Other Software
No response
Repro Steps
Security error, same as CVE-2026-31431
Allows you to get root access on a local machine. The error comes from an unpatched Kernel module's - xfrm-ESP and RxRPC.
The code is publicly available in projects:
Steps:
Expected Behavior
Error and no root access (with a rebuilt kernel without an error module, the exploit produces the expected result - on a standard WSL kernel, no).
Actual Behavior
I'm getting root access.
Diagnostic Logs
No response