Coding

"Dirty Frag" (CVE-2026-43284): The Second Linux Root Exploit in Eight Days

A devastating Linux root exploit, dubbed "Dirty Frag," has emerged, capitalizing on a previously unknown vulnerability in the Linux kernel's networking stack, specifically in the handling of IPv6 fragmentation (CVE-2026-43284). This marks the second high-severity Linux exploit in just eight days, underscoring the growing urgency for kernel patching and vulnerability mitigation in the face of escalating cyber threats. The exploit's ease of exploitation and widespread kernel adoption amplify its potential impact.

Dirty Frag is a Linux root exploit that capitalizes on a previously unknown vulnerability in the Linux kernel's networking stack, specifically in the handling of IPv6 fragmentation (CVE-2026-43284). This marks the second high-severity Linux exploit in just eight days, following Copy Fail.

Overview

Dirty Frag is a chained exploit that combines two Linux kernel vulnerabilities: CVE-2026-43284 and CVE-2026-43500. The root cause of CVE-2026-43284 lies in how the Linux kernel handles network packet memory in the IPsec/ESP path. An attacker who knows how to manipulate this behavior can achieve a controlled write into the kernel page cache and ultimately escalate to root.

What it does

Dirty Frag follows the same fundamental pattern as Copy Fail — a page cache write primitive turned into a root escalation — but through a completely different code path. The exploit's ease of exploitation and widespread kernel adoption amplify its potential impact. Every server running a mainstream Linux kernel built from roughly 2017 onwards is affected.

The fix

To fix the vulnerability, users should update their kernel to a patched version. Patched kernels are now available in production repositories as of May 8, 2026. For AlmaLinux, CloudLinux, Rocky Linux, CentOS Stream, RHEL, the command to update is:

sudo dnf clean metadata && sudo dnf upgrade 
sudo reboot

For Debian / Ubuntu:

sudo apt update && sudo apt upgrade 
sudo reboot

After rebooting, confirm the patched kernel is running with the command uname -r. If a reboot is not immediately possible, users can block the vulnerable modules from loading as an interim mitigation.

The disclosure of Dirty Frag highlights the importance of treating kernel updates with urgency, applying them as soon as they are available. For any server running web hosting workloads, it is crucial to patch today, reboot, verify, and set up alerting for future vulnerabilities.

Similar Articles

More articles like this

Coding 1 min

Visual Studio Code 1.120

Visual Studio Code’s 1.120 update slashes debugging friction with native Data Breakpoints, letting engineers pause execution when specific object properties change—not just memory addresses. The release also bakes in GitHub Copilot-powered inline code completions for Python, JavaScript, and TypeScript, cutting keystrokes by up to 40% in early benchmarks, while a revamped terminal shell integration finally bridges the gap between local and remote workflows.

Coding 1 min

Bun ported to Rust in 6 days

A 6-day code sprint has successfully ported Bun, a high-performance JavaScript runtime, to Rust, a systems programming language, marking a significant milestone in the pursuit of native, zero-CPU-overhead execution for web applications. This achievement leverages Rust's ownership model and borrow checker to eliminate runtime errors and memory safety issues. The port's rapid completion underscores the growing appeal of Rust as a platform for building high-performance, secure, and efficient web infrastructure.

Coding 1 min

GrapheneOS fixes Android VPN leak Google refused to patch

Android's VPN security gap, long dismissed by Google, has been plugged by GrapheneOS, a custom Android variant, through a patch that exploits a workaround for a kernel vulnerability, effectively bypassing the company's refusal to address the issue. The fix leverages a Linux kernel module to intercept and encrypt VPN traffic, circumventing a known flaw in Android's VPN implementation. This patch underscores the limitations of Google's control over Android's security.

Coding 1 min

Show HN: Mochi.js: bun-native high-fidelity browser automation library

A Bun-native browser automation library, Mochi.js, bypasses anti-bot defenses by eschewing superficial client-side probes in favor of raw Chrome DevTools Protocol (CDP) parity with stock Chromium, outperforming forked browsers by avoiding detectable artifacts. Built on a WAF-aware probe manifest, it targets the actual heuristics used by CAPTCHAs and web application firewalls, enabling high-fidelity automation without the need for deception. The framework’s JS-layer approach redefines browser automation by prioritizing consistency over cosmetic mimicry.

Coding 1 min

Bun's experimental Rust rewrite hits 99.8% test compatibility on Linux x64 glibc

Rust's growing adoption gets a significant boost as Bun, a high-performance JavaScript runtime, achieves near-flawless test compatibility on Linux x64 glibc with its experimental Rust rewrite, boasting an impressive 99.8% test pass rate. This milestone marks a crucial step towards mainstream adoption of Rust in the Linux ecosystem. The achievement underscores the potential for Rust to become a go-to language for building high-performance, secure applications.

Coding 1 min

All my clients wanted a carousel, now it's an AI chatbot

The rise of conversational interfaces has turned a once-standard design element into a redundant relic, as clients increasingly demand AI-powered chatbots to replace static carousels in digital product experiences. This shift is driven by the growing adoption of large language models, which enable seamless, human-like interactions that were previously the exclusive domain of bespoke development. As a result, designers are reevaluating the role of traditional UI elements in favor of more dynamic, AI-driven interfaces.