Proof-of-Concept Exploit Released for Three Vulnerabilities in the Linux Kernel
Successful exploitation of CVE-2026-46300, CVE‑2026‑43284, and CVE‑2026‑43500 in Linux distributions could allow an unprivileged attacker to achieve root privileges on the system
Summary
Successful exploitation of CVE-2026-46300, CVE‑2026‑43284, and CVE‑2026‑43500 in Linux distributions could allow an unprivileged attacker to achieve root privileges on the system
Threat details
Proof-of-Concept Exploit
Security researchers have published a proof‑of‑concept exploit for CVE-2026-46300, CVE‑2026‑43284, and CVE‑2026‑43500. The NHS England National CSOC assesses exploitation as highly likely.
Introduction
Security researchers have published a proof‑of‑concept exploit for CVE‑2026‑43284 and CVE‑2026‑43500 (dubbed as "Dirty Frag") affecting Linux Kernel. When chained together, successful exploitation of CVE‑2026‑43284 and CVE‑2026‑43500, could allow an unprivileged attacker to achieve root privileges on the Linux distribution.
Note: Systems with the publicly known "Copy‑Fail" mitigation applied remain vulnerable to Dirty Frag.
CVE-2026-46300 (dubbed as "Fragnesia")
Security researchers have published a proof‑of‑concept exploit for CVE-2026-46300 (dubbed as "Fragnesia"). CVE-2026-46300 is a member of the Dirty Frag vulnerability class affecting Linux Kernel. Successful exploitation could allow a local, unprivileged attacker to gain root access on Linux systems via kernel page‑cache corruption.
Note: Linux kernel versions vulnerable to the “Dirty Frag” are also vulnerable to "Fragnesia", including kernels released prior to 13 May 2026.
Threat updates
| Date | Update |
|---|---|
| 14 May 2026 |
CVE-2026-46300 ("dubbed as Fragnesia") published
Affected platform updated to reflect systems vulnerable to "Fragnesia" Added a blue box for CVE-2026-46300 Remediation updated to reflect mitigations for CVE-2026-46300 |
| 11 May 2026 |
CVE-2026-43500 record published
Security patches published for CVE-2026-43500 |
Remediation advice
Affected organisations are strongly encouraged to update affected Linux distributions' kernel package to one that includes mainline commit f4c50a4034e62ab75f1d5cdd191dd5f9c77fdff4 and aa54b1d27fe0c2b78e664a34fd0fdf7cd1960d71 as soon as possible.
The two mainline commits mitigate risks to both Dirty Frag and Fragnesia vulnerabilities.
Most major distributions are currently shipping fixed versions through normal kernel package updates.
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 14 May 2026 2:04 pm