Skip to main content

Proof-of-Concept Exploit Released for Three Vulnerabilities in the Linux Kernel

Successful exploitation of CVE-2026-46300, CVE‑2026‑43284, and CVE‑2026‑43500 in Linux distributions could allow an unprivileged attacker to achieve root privileges on the system

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Successful exploitation of CVE-2026-46300, CVE‑2026‑43284, and CVE‑2026‑43500 in Linux distributions could allow an unprivileged attacker to achieve root privileges on the system


Threat details

Proof-of-Concept Exploit

Security researchers have published a proof‑of‑concept exploit for CVE-2026-46300, CVE‑2026‑43284, and CVE‑2026‑43500. The NHS England National CSOC assesses exploitation as highly likely. 


Introduction

Security researchers have published a proof‑of‑concept exploit for CVE‑2026‑43284 and CVE‑2026‑43500 (dubbed as "Dirty Frag") affecting Linux Kernel. When chained together, successful exploitation of CVE‑2026‑43284 and CVE‑2026‑43500, could allow an unprivileged attacker to achieve root privileges on the Linux distribution. 

Note: Systems with the publicly known "Copy‑Fail" mitigation applied remain vulnerable to Dirty Frag.

CVE-2026-46300 (dubbed as "Fragnesia")

Security researchers have published a proof‑of‑concept exploit for CVE-2026-46300 (dubbed as "Fragnesia"). CVE-2026-46300 is a member of the Dirty Frag vulnerability class affecting Linux Kernel. Successful exploitation could allow a local, unprivileged attacker to gain root access on Linux systems via kernel page‑cache corruption. 

Note: Linux kernel versions vulnerable to the “Dirty Frag” are also vulnerable to "Fragnesia", including kernels released prior to 13 May 2026.


Threat updates

Date Update
14 May 2026 CVE-2026-46300 ("dubbed as Fragnesia") published

Affected platform updated to reflect systems vulnerable to "Fragnesia"

Added a blue box for CVE-2026-46300 

Remediation updated to reflect mitigations for CVE-2026-46300

11 May 2026 CVE-2026-43500 record published

Security patches published for CVE-2026-43500


Remediation advice

Affected organisations are strongly encouraged to update affected Linux distributions' kernel package to one that includes mainline commit f4c50a4034e62ab75f1d5cdd191dd5f9c77fdff4  and aa54b1d27fe0c2b78e664a34fd0fdf7cd1960d71 as soon as possible.

The two mainline commits mitigate risks to both Dirty Frag and Fragnesia vulnerabilities. 

Most major distributions are currently shipping fixed versions through normal kernel package updates.



CVE Vulnerabilities

Last edited: 14 May 2026 2:04 pm