Overview
Description
Statistics
- 19 Posts
- 206 Interactions
Fediverse
#DirtyFrag status/advisories:
AlmaLinux:
https://almalinux.org/blog/2026-05-07-dirty-frag/
Debian:
https://security-tracker.debian.org/tracker/CVE-2026-43500
https://security-tracker.debian.org/tracker/CVE-2026-43284
Gentoo:
https://bugs.gentoo.org/974307
RedHat:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2026-43284
https://access.redhat.com/security/cve/cve-2026-43284
nothing yet on CVE-2026-43500
Rocky:
https://kb.ciq.com/article/rocky-linux/rl-dirty-frag-mitigation
SUSE / OpenSUSE:
https://www.suse.com/security/cve/CVE-2026-43500.html
https://www.suse.com/security/cve/CVE-2026-43284.html
https://www.suse.com/c/addressing-copy-fail2-aka-dirtyfrag-in-suse-virtualization/
Ubuntu:
https://ubuntu.com/security/CVE-2026-43284
https://ubuntu.com/security/CVE-2026-43500
https://ubuntu.com/blog/dirty-frag-linux-vulnerability-fixes-available
AWS:
https://aws.amazon.com/security/security-bulletins/rss/2026-027-aws/
https://explore.alas.aws.amazon.com/CVE-2026-43284.html
Just got a kernel update from Debian 13's security channel, which fixes both CVE-2026-43284 and CVE-2026-43500, aka "Dirty Frag".
Debian 12 is not yet patched.
Tracker Links:
https://security-tracker.debian.org/tracker/CVE-2026-43284
https://security-tracker.debian.org/tracker/CVE-2026-43500
CVE-2026-43284 / "Dirty Frag" .. Antoher one of those nasty local-privilege-escallations.
Quickfix for Centos/Fedora based systems:
printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf && rmmod esp4 esp6 rxrpc 2>/dev/null; true
Caution: That also effectively disables IPSEC and AFS client support. But it can easily be reverted by removing the file when a patched kernel arrives.
#dirtyfrag #cve_2026_43284 #security #centos #fedora #redhat
📰 Critical Unpatched 'Dirty Frag' Linux Zero-Day Allows Instant Root Access
🚨 CRITICAL ZERO-DAY: 'Dirty Frag' (CVE-2026-43284) vulnerability in Linux kernel disclosed with NO PATCH. Allows immediate root privilege escalation. Flaw has existed for 9 years. Admins must seek mitigations now! 🐧🔥 #Linux #ZeroDay #CyberSecurity
CVE-2026-43284 ("Dirty Frag") Alma Linux https://almalinux.org/blog/2026-05-07-dirty-frag/
Fedora pushed kernel 7.0.4 to stable to fix the Dirty Frag and Copy Fail 2 vulnerabilities. Both CVE-2026-43284 and CVE-2026-43500 Patched.
Full details here: https://ostechnix.com/fedora-44-kernel-7-0-4-dirty-frag-copy-fail-2-fix/
#Fedora44 #Linuxkernel704 #DirtyFrag #CopyFail2 #CVE_2026_43284 #CVE_2026_43500
@Edent In theory yes, if they load one of the vulnerable kernel modules then you could achieve root on them with a compatible exploit.
The vulnerable module in the initial CopyFail exploit was AF_ALG.
There is a good summary of the vulnerable modules for the second two disclosed this week here, there are more, in this post on @ifin
https://discourse.ifin.network/t/cve-2026-43284-cve-2026-2026-43500-new-copyfail-variants-dirtyfrag/395
"Dirty Frag" status update on the clickbait overhype: ESP half (CVE-2026-43284) now patched: mainline f4c50a4034e6, stable backports in 7.0.5 / 6.18.28 / 6.12.87 / 6.6.138 / 6.1.171 / 5.15.205 / 5.10.255. RxRPC half (CVE-2026-43500) still unpatched upstream. AWS now adds ipcomp4/ipcomp6 to the blacklist alongside esp4/esp6/rxrpc, adjacent xfrm code paths, defense in depth or a hint more is coming. AlmaLinux and CloudLinux shipped both fixes. Ubuntu, Debian, RHEL, Amazon still mitigation only.
O Debian lançou atualizações de kernel para corrigir o bug #DirtyFrag.
Atualizem imediatamente.
:debian: https://security-tracker.debian.org/tracker/CVE-2026-43284
:debian: https://security-tracker.debian.org/tracker/CVE-2026-43500
Habis #CopyFail terbitlah #DirtyFrag
- CVE-2026-43284
- CVE-2026-43500
Belum coba sih poc-nya, tapi sepertinya simpel juga.
Tour d'horizon #DirtyFrag du jour :
Bien évidemment Microsoft a sauté sur l'occasion avec un article sur une vuln Linux ...because M love Linux
👇
https://www.microsoft.com/en-us/security/blog/2026/05/08/active-attack-dirty-frag-linux-vulnerability-expands-post-compromise-risk/
L'incontournable FAQ Tenable pour ceux comme moi qui aiment lire les CVE comme un mode d'emploi IKEA
👇
https://www.tenable.com/blog/dirty-frag-cve-2026-43284-cve-2026-43500-frequently-asked-questions-linux-kernel-lpe
Red Hat a mis à jour sa page RHSB-2026-003 avec mitigations et vérifs, en attendant le patch qui arrive "bientôt™"
👇
https://access.redhat.com/security/vulnerabilities/RHSB-2026-003
Et chez moi sur ma belle et adorée Debian ? Les canaux security sont patchés pour bullseye, bookworm et trixie.
Bien joué !
👇
https://security-tracker.debian.org/tracker/CVE-2026-43284
Cela dit, effectivement avec l'IA qui accélère la découverte + embargos qui tiennent plus = fenêtre d'exposition qui va pas aller en rétrécissant. Les mainteneurs vont devoir trouver de nouveaux tricks. Live-patch, micro-patch, pipelines accélérés... à suivre.
Another day, another severe Linux vulnerability / bug: #DirtyFrag
Links:
Mitigation:
https://github.com/V4bel/dirtyfrag#mitigation
CVE:
https://nvd.nist.gov/vuln/detail/CVE-2026-43284
#cve_2026_43500 #cve_2026_43284 #cve #Linux #ZeroDay #infosec #security
Dirty Frag (CVE-2026-43284, CVE-2026-43500) exploits page-cache corruption in IPsec ESP and RxRPC modules, allowing any authenticated user to escalate to root without audit trails. Affects kernels from ~2017...
Bluesky
Overview
Description
Statistics
- 16 Posts
- 192 Interactions
Fediverse
#DirtyFrag status/advisories:
AlmaLinux:
https://almalinux.org/blog/2026-05-07-dirty-frag/
Debian:
https://security-tracker.debian.org/tracker/CVE-2026-43500
https://security-tracker.debian.org/tracker/CVE-2026-43284
Gentoo:
https://bugs.gentoo.org/974307
RedHat:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2026-43284
https://access.redhat.com/security/cve/cve-2026-43284
nothing yet on CVE-2026-43500
Rocky:
https://kb.ciq.com/article/rocky-linux/rl-dirty-frag-mitigation
SUSE / OpenSUSE:
https://www.suse.com/security/cve/CVE-2026-43500.html
https://www.suse.com/security/cve/CVE-2026-43284.html
https://www.suse.com/c/addressing-copy-fail2-aka-dirtyfrag-in-suse-virtualization/
Ubuntu:
https://ubuntu.com/security/CVE-2026-43284
https://ubuntu.com/security/CVE-2026-43500
https://ubuntu.com/blog/dirty-frag-linux-vulnerability-fixes-available
AWS:
https://aws.amazon.com/security/security-bulletins/rss/2026-027-aws/
https://explore.alas.aws.amazon.com/CVE-2026-43284.html
Just got a kernel update from Debian 13's security channel, which fixes both CVE-2026-43284 and CVE-2026-43500, aka "Dirty Frag".
Debian 12 is not yet patched.
Tracker Links:
https://security-tracker.debian.org/tracker/CVE-2026-43284
https://security-tracker.debian.org/tracker/CVE-2026-43500
Fedora pushed kernel 7.0.4 to stable to fix the Dirty Frag and Copy Fail 2 vulnerabilities. Both CVE-2026-43284 and CVE-2026-43500 Patched.
Full details here: https://ostechnix.com/fedora-44-kernel-7-0-4-dirty-frag-copy-fail-2-fix/
#Fedora44 #Linuxkernel704 #DirtyFrag #CopyFail2 #CVE_2026_43284 #CVE_2026_43500
"Dirty Frag" status update on the clickbait overhype: ESP half (CVE-2026-43284) now patched: mainline f4c50a4034e6, stable backports in 7.0.5 / 6.18.28 / 6.12.87 / 6.6.138 / 6.1.171 / 5.15.205 / 5.10.255. RxRPC half (CVE-2026-43500) still unpatched upstream. AWS now adds ipcomp4/ipcomp6 to the blacklist alongside esp4/esp6/rxrpc, adjacent xfrm code paths, defense in depth or a hint more is coming. AlmaLinux and CloudLinux shipped both fixes. Ubuntu, Debian, RHEL, Amazon still mitigation only.
O Debian lançou atualizações de kernel para corrigir o bug #DirtyFrag.
Atualizem imediatamente.
:debian: https://security-tracker.debian.org/tracker/CVE-2026-43284
:debian: https://security-tracker.debian.org/tracker/CVE-2026-43500
Habis #CopyFail terbitlah #DirtyFrag
- CVE-2026-43284
- CVE-2026-43500
Belum coba sih poc-nya, tapi sepertinya simpel juga.
Tour d'horizon #DirtyFrag du jour :
Bien évidemment Microsoft a sauté sur l'occasion avec un article sur une vuln Linux ...because M love Linux
👇
https://www.microsoft.com/en-us/security/blog/2026/05/08/active-attack-dirty-frag-linux-vulnerability-expands-post-compromise-risk/
L'incontournable FAQ Tenable pour ceux comme moi qui aiment lire les CVE comme un mode d'emploi IKEA
👇
https://www.tenable.com/blog/dirty-frag-cve-2026-43284-cve-2026-43500-frequently-asked-questions-linux-kernel-lpe
Red Hat a mis à jour sa page RHSB-2026-003 avec mitigations et vérifs, en attendant le patch qui arrive "bientôt™"
👇
https://access.redhat.com/security/vulnerabilities/RHSB-2026-003
Et chez moi sur ma belle et adorée Debian ? Les canaux security sont patchés pour bullseye, bookworm et trixie.
Bien joué !
👇
https://security-tracker.debian.org/tracker/CVE-2026-43284
Cela dit, effectivement avec l'IA qui accélère la découverte + embargos qui tiennent plus = fenêtre d'exposition qui va pas aller en rétrécissant. Les mainteneurs vont devoir trouver de nouveaux tricks. Live-patch, micro-patch, pipelines accélérés... à suivre.
Another day, another severe Linux vulnerability / bug: #DirtyFrag
Links:
Mitigation:
https://github.com/V4bel/dirtyfrag#mitigation
CVE:
https://nvd.nist.gov/vuln/detail/CVE-2026-43284
#cve_2026_43500 #cve_2026_43284 #cve #Linux #ZeroDay #infosec #security
Dirty Frag (CVE-2026-43284, CVE-2026-43500) exploits page-cache corruption in IPsec ESP and RxRPC modules, allowing any authenticated user to escalate to root without audit trails. Affects kernels from ~2017...
Bluesky
Overview
Description
Statistics
- 5 Posts
- 15 Interactions
Fediverse
Hmmm. #Debian is stepping on the gas with #Linux kernel updates these days. The obvious explanation is that they're dealing with the copy.fail security hole, but I think that's been mostly resolved ( https://security-tracker.debian.org/tracker/CVE-2026-31431 ).
Possibly copy.fail is the first of many security problems being discovered and patched.
1/3
Was Sysadmins zu CVE 2026 31431 wissen müssen
https://www.golem.de/news/732-bytes-bis-root-was-sysadmins-zu-cve-2026-31431-wissen-muessen-2605-208469.html?utm_source=flipboard&utm_medium=activitypub
Gepostet in GOLEM @golem-Golemde
Bluesky
Overview
Description
Statistics
- 1 Post
- 3 Interactions
Fediverse
Davide Ornaghi and Giuseppe Caruso found a very interesting bug in #Linux's in-kernel Samba3 server from 6.12 to 6.19.x. Essentially, from the commit message and #CVE description:
> Currently, ksmbd does not verify if the user attempting to reconnect to a durable handle is the same user who originally opened the file. This allows any authenticated user to hijack an orphaned durable handle by predicting or brute-forcing the persistent ID.
Very interesting stuff! The kernel let's users resume their connection to an open file even after WiFi drops (durable handle), and a bug in this code let another authenticated user become this WiFi-dropped user, letting the hijacker access all files.
https://github.com/TurtleARM/CVE-2026-31717-KSMBD-Exploit
CVE-2026-31717
Overview
- go-pkgz
- auth
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
🔴 CRITICAL: go-pkgz auth (1.18.0 – 1.25.1, 2.0.0 – 2.1.1) has a major Patreon OAuth flaw (CVE-2026-42560) — all users merged as one! Patch to 1.25.2/2.1.2 to prevent cross-account access & data leaks. Details: https://radar.offseq.com/threat/cve-2026-42560-cwe-287-improper-authentication-in--e3a2d952 #OffSeq #CVE202642560 #OAuth #infosec
Overview
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
(UPDATED) FreeBSD CVE-2026-4747 Log Suggests Mythos is a Marketing Trick https://www.flyingpenguin.com/freebsd-cve-2026-4747-log-suggests-mythos-is-a-marketing-trick/
Overview
Description
Statistics
- 1 Post
- 2 Interactions
Overview
- CHORNY
- Apache::Session
- Apache-Session
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
RE: https://infosec.exchange/@nyanbinary/116539528145289050
Oh god...
https://nvd.nist.gov/vuln/detail/CVE-2013-10075
2013
Published 2026-05-08
Edit: Hm, apparently the year-field doesn't actually relate to the date it was reserved, TIL
Overview
Description
Statistics
- 1 Post
- 2 Interactions
Overview
Description
Statistics
- 1 Post
- 2 Interactions