WhisperX tag archive

#Dirty Frag

This page collects WhisperX intelligence signals tagged #Dirty Frag. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (8)

The Lab · 2026-05-08 17:24:44 · GitHub Issues

1. Dirty Frag Zero-Day Exposes Linux Kernel: Unpatched Universal LPE Vulnerability Drops Without Fix

A cluster of critical Linux kernel vulnerabilities has surfaced this week with no available patches, creating an immediate and active threat landscape for systems worldwide. The most severe disclosure—Dirty Frag—has been identified as a universal Linux Local Privilege Escalation (LPE) zero-day. The vulnerability was di...

The Lab · 2026-05-08 21:54:53 · Microsoft Security Blog

2. "Dirty Frag" Linux Kernel Vulnerability Under Active Attack, Enables Root Privilege Escalation

A newly disclosed Linux local privilege escalation vulnerability dubbed "Dirty Frag" is under active exploitation, enabling attackers to escalate from unprivileged user to root through vulnerable kernel networking and memory-fragment handling components. The flaw affects esp4 and esp6 components (CVE-2026-43284) and rx...

The Lab · 2026-05-09 22:31:47 · Mastodon:mastodon.social:#cybersecurity

3. "Dirty Frag" (CVE-2026-43284): Second Linux Root Exploit Emerges Within Days of Prior Vulnerability

A newly disclosed vulnerability cataloged as CVE-2026-43284—dubbed "Dirty Frag"—has surfaced as the second Linux kernel privilege-escalation exploit to emerge in an eight-day window, raising fresh scrutiny over kernel-level attack surface and the pace of coordinated vulnerability disclosure in open-source infrastructur...

The Lab · 2026-05-11 08:40:30 · GitHub Issues

4. CVE-2026-43284 « Dirty Frag » : faille Linux Kernel permet une élévation de privilèges root — aucun correctif disponible

Une vulnérabilité critique de type Local Privilege Escalation, désignée CVE-2026-43284 et connue sous le nom Dirty Frag, a été divulguée le 7 mai 2026. Elle affecte les modules noyau Linux `esp4` et `esp6`, responsables du traitement IPsec ESP utilisé par des solutions VPN telles que StrongSwan ou le fallback WireGuard...

The Lab · 2026-05-11 12:10:34 · SecurityWeek RSS

5. Unpatched 'Dirty Frag' Linux Kernel Flaw Tracked as CVE-2026-43284 and CVE-2026-43500 Under Active Exploitation Scrutiny

Security researchers have identified a critical Linux kernel vulnerability, internally referred to as "Dirty Frag" and also known as "Copy Fail 2," tracked under CVE-2026-43284 and CVE-2026-43500. The flaw was publicly disclosed before a corresponding security patch became available, raising urgent concerns within the ...

The Lab · 2026-05-13 08:48:29 · Mastodon:hachyderm.io:#infosec

6. Linux Kernel Maintainers Pitch Emergency 'Killswitch' After CopyFail and Dirty Frag Privilege-Escalation Flaws

Linux kernel maintainers have proposed a new runtime disable mechanism, called "Killswitch," that would allow administrators to immediately deactivate vulnerable kernel subsystems while patches are built, tested, and deployed. The initiative directly addresses the operational gap that leaves production systems exposed ...

The Lab · 2026-05-13 09:48:26 · GitHub Issues

7. Scaleway Patches Kapsule Against Dirty Frag Kernel LPE After Functions-Runner Container Escape Risk Flagged

Scaleway has issued a security advisory addressing CVE-2026-43284, a Linux kernel local privilege escalation vulnerability affecting the ESP IPsec transform modules (`esp4`/`esp6`) and the AF_RXRPC socket family (`rxrpc`). The flaw mirrors the threat shape of CVE-2026-31431 (Copy Fail), allowing a local unprivileged us...

The Lab · 2026-05-14 18:18:20 · The Register

8. Linux Kernel Flaw Fragnesia Grants Root Access via XFRM Subsystem; PoC Exploit Public

Security researchers at Wiz have disclosed "Fragnesia," a critical Linux kernel local privilege escalation vulnerability that permits unprivileged users to obtain root-level access by corrupting page cache memory. Tracked as CVE-2026-46300, the flaw was discovered by William Bowling of the V12 security team and resides...