Linux Distributors Patch 2 Dirty Frag Flaws as Leaked Exploit Grants Root Access
Updated
Updated · Ars Technica · May 11
Linux Distributors Patch 2 Dirty Frag Flaws as Leaked Exploit Grants Root Access
3 articles · Updated · Ars Technica · May 11
Debian, AlmaLinux and Fedora released patches for Dirty Frag after the privilege-escalation bug was disclosed late last week and quickly turned into a zero-day.
Three days after exploit code leaked online, Microsoft said it had seen signs of attackers experimenting with the flaw in the wild; the exploit works reliably across virtually all Linux distributions.
Dirty Frag chains CVE-2026-43284 and CVE-2026-43500 to let low-privilege users—including in containers and virtual machines—gain root on shared servers without crashing systems.
Linux also shipped kernels 7.0.6 and 6.18.29 LTS to fully fix the issue, underscoring a second severe Linux privilege-escalation threat in as many weeks after Copy Fail.
If this flaw existed for nine years, what other catastrophic bugs are hiding in Linux?
How can we re-architect software to eliminate entire classes of memory corruption bugs for good?
When AI finds critical exploits in minutes, is our entire cybersecurity model obsolete?