The Lab · 2026-05-08 21:54:53 · Microsoft Security Blog
A newly disclosed Linux local privilege escalation vulnerability dubbed "Dirty Frag" is under active exploitation, enabling attackers to escalate from unprivileged user to root through vulnerable kernel networking and memory-fragment handling components. The flaw affects esp4 and esp6 components (CVE-2026-43284) and rx...
The Lab · 2026-05-09 07:01:53 · Mastodon:hachyderm.io:#infosec
A severe Linux kernel vulnerability dubbed "DirtyFrag" has emerged as an unpatched zero-day with a publicly available proof-of-concept exploit capable of granting root privileges. The flaw, tracked as CVE-2026-43284 and CVE-2026-43500, currently has no official patches available, leaving Linux systems potentially expos...
The Lab · 2026-05-09 22:31:46 · Mastodon:mastodon.social:#cybersecurity
A newly surfaced Linux vulnerability identified as CVE-2026-43284, informally referred to as "Dirty Frag," has sparked urgent discussion within cybersecurity circles. The flaw appears to enable privilege escalation to root-level access, prompting security professionals to call for immediate patching across affected sys...
The Lab · 2026-05-09 22:31:47 · Mastodon:mastodon.social:#cybersecurity
A newly disclosed vulnerability cataloged as CVE-2026-43284—dubbed "Dirty Frag"—has surfaced as the second Linux kernel privilege-escalation exploit to emerge in an eight-day window, raising fresh scrutiny over kernel-level attack surface and the pace of coordinated vulnerability disclosure in open-source infrastructur...
The Lab · 2026-05-11 08:40:30 · GitHub Issues
Une vulnérabilité critique de type Local Privilege Escalation, désignée CVE-2026-43284 et connue sous le nom Dirty Frag, a été divulguée le 7 mai 2026. Elle affecte les modules noyau Linux `esp4` et `esp6`, responsables du traitement IPsec ESP utilisé par des solutions VPN telles que StrongSwan ou le fallback WireGuard...
The Lab · 2026-05-11 12:10:34 · SecurityWeek RSS
Security researchers have identified a critical Linux kernel vulnerability, internally referred to as "Dirty Frag" and also known as "Copy Fail 2," tracked under CVE-2026-43284 and CVE-2026-43500. The flaw was publicly disclosed before a corresponding security patch became available, raising urgent concerns within the ...
The Lab · 2026-05-11 19:48:26 · GitHub Issues
A 14-hour threat intelligence window has surfaced multiple concurrent critical vulnerabilities, marking what analysts describe as a potential inflection point in offensive cyber capabilities. The most significant development: the first documented AI-generated zero-day exploit specifically engineered to bypass two-facto...
The Lab · 2026-05-13 09:48:26 · GitHub Issues
Scaleway has issued a security advisory addressing CVE-2026-43284, a Linux kernel local privilege escalation vulnerability affecting the ESP IPsec transform modules (`esp4`/`esp6`) and the AF_RXRPC socket family (`rxrpc`). The flaw mirrors the threat shape of CVE-2026-31431 (Copy Fail), allowing a local unprivileged us...