Dirty Frag also allows for container escape, and similarly affects nearly all Linux distributions in use today. It was discovered by Hyunwoo Kim, and exploits the same underlying design flaw in how Linux manages files in memory. The attack corrupts files in memory without touching the originals on disk, leaving standard security monitoring tools unable to detect it.
| Vendor | Product | Versions |
|---|---|---|
| linux | linux_kernel | cac2661c53f35cbe651bef9b07026a5a05ab8ce0, cac2661c53f35cbe651bef9b07026a5a05ab8ce0, cac2661c53f35cbe651bef9b07026a5a05ab8ce0, cac2661c53f35cbe651bef9b07026a5a05ab8ce0, cac2661c53f35cbe651bef9b07026a5a05ab8ce0, cac2661c53f35cbe651bef9b07026a5a05ab8ce0, cac2661c53f35cbe651bef9b07026a5a05ab8ce0, cac2661c53f35cbe651bef9b07026a5a05ab8ce0, cac2661c53f35cbe651bef9b07026a5a05ab8ce0, cac2661c53f35cbe651bef9b07026a5a05ab8ce0, 4.11 |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| linux | linux | mitre_affected | 90% |
| open source | linux kernel | cert_advisory | 90% |
Updated description with new details about the discovery and impact, changed severity to IMPORTANT, and noted that no patch is currently available.
Updated description with detailed technical information about the Dirty Frag exploit and added new CWE and tags.
Updated description with detailed technical information, added new CWE IDs, and included new tags related to the vulnerability.
Updated description with detailed technical information about the Dirty Frag exploit and changed severity from NONE to HIGH.
Updated description with new technical details, added affected versions, changed severity to HIGH, and included new CWE and tags.
Updated description with details on publicly available Proof of Concepts and added affected environments and tags.
Updated description with details on CVE-2026-43284 and CVE-2026-43500, added CWE-123, marked as actively exploited, and noted that no universal fix is available.
Updated description with details about the 'Dirty Frag' vulnerability and added new CVE IDs and tags.
Updated affected versions to include 6.6.137, 6.12.86, 6.18.27, 7.0.4 and changed severity to CRITICAL.
Initial creation