Home > Control panel > Operations notices > Linux kernel vulnerability requiring VM restarts (Dirtyfrag)

Related Links

Notice Links:

Notice

Linux kernel vulnerability requiring VM restarts (Dirtyfrag)

PostedFri, 8 May 2026 08:21 AM UTC
Fri, 8 May 2026 04:21 AM EDT
Last UpdateFri, 8 May 2026 14:26 PM UTC (30 hours ago)
Fri, 8 May 2026 10:26 AM EDT
StatusOpen

A serious Linux kernel vulnerability has been publicly disclosed:

https://github.com/V4bel/dirtyfrag

This issue has been allocated CVE-2026-43284, also known as Dirtyfrag.

The issue affects most Linux kernels released in the last decade. It allows a local unprivileged user or process to gain root privileges. In practical terms, if an attacker has access to run code inside a VM, for example through a compromised website, shell account, or application, this bug may allow them to take full control of that VM.

Where a server is using a modular kernel, you should check with the distributor as soon as possible for update and mitigation steps.

We have released patched VM kernels to our hosts. A reboot will be required to use that. We recomend you restart your server as soon as possible to adopt an updated kernel. They should be restarted from our control panel.

You can verify which kernel your VM is running using the command 'uname -r', it will look something like this...:

6.12.0-really87-rh-20260508114817.xenU.x86_64

Patched kernels will show a build date of 20260508 or newer. Those digits are the date: 2026 May 8th.

We are continuing to assess this vulnerability and will be providing updates and further recomendations here. Please subscribe to this notice for updates.

#

Keep You Updated?

Log in to subscribe to changes to this notice.

Set your operation notice contact details for future notifications.