Dirty Frag: Unpatched Linux vulnerability delivers root access
A week after Copy Fail, another Linux local privilege escalation vulnerability dubbed “Dirty Frag” has been revealed, along with a PoC exploit. What is Dirty Frag In effect, Dirty Frag refers to two flaws: A xfrm-ESP Page-Cache Write vulnerability (CVE-2026-43284, aka Copy Fail 2.0), now patched in
ORIGINAL SOURCE →via Help Net Security
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] Proof-of-Commitment Internals: How the Scoring Algorithm Works
- [CYBER] Supply chain npm vs PyPI: I compared both simulations and the most dangerous vector isn't what everyone thinks
- [CYBER] In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director Frontrunner
- [CYBER] US says it disables two more Iranian tankers in Gulf of Oman
- [CYBER] OpenAI rolls out new model for cybersecurity teams a month after Anthropic's Mythos debut
- [CYBER] This Week in Security: Another Linux Exploit, Ubuntu Knocked Offline, Finals Interrupted, and Backdoored Tools