
Notice Links:
| Posted | Fri, 8 May 2026 08:21 AM UTC
Fri, 8 May 2026 04:21 AM EDT |
|---|---|
| Last Update | Fri, 8 May 2026 14:26 PM UTC (30 hours ago)
Fri, 8 May 2026 10:26 AM EDT |
| Status | Open |
A serious Linux kernel vulnerability has been publicly disclosed: https://github.com/V4bel/dirtyfrag This issue has been allocated CVE-2026-43284, also known as Dirtyfrag. The issue affects most Linux kernels released in the last decade. It allows a local unprivileged user or process to gain root privileges. In practical terms, if an attacker has access to run code inside a VM, for example through a compromised website, shell account, or application, this bug may allow them to take full control of that VM. Where a server is using a modular kernel, you should check with the distributor as soon as possible for update and mitigation steps. We have released patched VM kernels to our hosts. A reboot will be required to use that. We recomend you restart your server as soon as possible to adopt an updated kernel. They should be restarted from our control panel.
You can verify which kernel your VM is running using the command 'uname -r', it will look something like this...: 6.12.0-really87-rh-20260508114817.xenU.x86_64 Patched kernels will show a build date of 20260508 or newer. Those digits are the date: 2026 May 8th. We are continuing to assess this vulnerability and will be providing updates and further recomendations here. Please subscribe to this notice for updates. # | |
Log in to subscribe to changes to this notice.
Set your operation notice contact details for future notifications.