Dirty Frag Vulnerability (CVE-2026-43284, CVE-2026-43500)
Posted: 2026-05-08 10:41:39 Expiration: 2026-06-15 10:41:39
This document is the cybersecurity announcement for CVE-2026-43284 and CVE-2026-43500. Please see https://kb.wisc.edu/public-cloud/news.php?id=14131 for additional updates related to Copy Fail.
About the Event
On May 7, 2026, an independent security researcher released a security write up for a privilege escalation vulnerability in the Linux kernel that affects every major Linux distribution.
Actions to Consider
Cybersecurity recommends Linux administrators apply patches where they are available within 3 days. Mitigations for Copy Fail are being published. Admins should review the potential impact and test where possible before deploying mitigations in their environments.
Cloud provider guidance:
-
Kernel LPE Vulnerabilities (Copy Fail + DirtyFrag) — AKS Advisory & Mitigation Guide
- GCP Security Bulletins
-
Open to the world
-
Shared, where multiple users share the device. Such as shared development boxes, jump boxes, build servers, lab machines.
-
Kubernetes/container clusters.
-
GitLab runners, Jenkins agents, anything that automatically executes code as a regular user.
-
Software as a service that runs user code. Such as JuypterHub, Juypter Notebook
Cybersecurity is continuing to evaluate/develop detections for indicators of compromise and will share information as they become available. If you believe you may have been compromised please contact the Office of Cybersecurity at cybersecurity@cio.wisc.edu.
Event Impact
Any local unprivileged user would be able to obtain root-level access resulting in a full system takeover. Proof of concept code is already publicly available.
References
-- Public Cloud: Steve Tanner