Too bad Bitcoin mining isn't in style anymore.So if one were to rent an ec2, one could get root and then move laterally through AWS? Is that the thing?
It's not a VM escape mechanism; only a container-escape mechanism. It only affects systems running with a shared kernel, not systems running fully compartmentalized.I am a bit confused by the mentions of virtual machines here. The article almost makes it sound like this is a VM escape vulnerability, but I don't think that's the case based on other sources.
Anonymously I presume?Shortly after the disclosure, someone else leaked key details
From what I read elsewhere, it was someone reverse engineering the patch (Linux being open source) to figure out the exploit and then posting it online to let the world know prior to the 90 days.So whatever happened to that 90 day rule? I thought people who found these sorts of exploits were supposed to tell the vendors/maintainers, and given them 90 days to get the patches out (and in this case, the distros) before disclosing vulnerabilities.
Is that not a thing anymore?
You mean don’t enjoy 3 or more nested reboots during Windows patches? I always assume it’s the cold revenge for not having to reboot after every app install anymore.you know, I'd be much more upset about the reboot if Linux was like Windows via my work laptop and I had to restart every time something sneezed. But I haven't restarted my Linux desktop box in 4 months and my raspberry pi that is my self-host routing source just reported crossing a year of uptime.
Which is to say in the past seven days I'll have rebooted my work laptop due to forced restarts more often than the sum of my Linux machines in 2026.
"Only reason" without addressing the Microsoft-sized elephant in the room (among a myriad of other things)...Literally the only reason people tolerate Linux for. Now compromised.

linux-image package in Debian that's hardly an elegant solution.Literally the only reason people tolerate Linux for. Now compromised.
arch btw?I use Linux just so I can tell people in casual conversation that I use Linux.
Yeah, the Google page Dan links to provides absolutely no reasoning for mentioning virtual machines.It's not a VM escape mechanism; only a container-escape mechanism. It only affects systems running with a shared kernel, not systems running fully compartmentalized.
I really appreciate this note. I have been using kinoite on a couple machines for the last year and love it. The news freaked me out and wanted to thank you for the background."For single-user systems a root privilege escalation vuln is not really a huge deal."
As someone who as performed pen tests, old/unused code represents some of the most juicy exploits we find. I once found something like this in code our organization hadn't used in over 10 years. But it was still installed, providing the attack surface.Both this and copyfail use kernel extensions that I have no use for on my servers. These exploits demonstrate that keeping around unused kernel modules increases attack surface. Disabling them the moment an exploit is announced is the best I can do right now, but what happens when a bad actor finds one of these first rather than a security researcher?
Maybe if these sort of exploits continue showing up with some regularity Linux will get a mechanism to only allow modules that are explicitly whitelisted, rather than the modprobe blacklist mechanism? Or maybe there's already a way to do this? I mean, one can simply delete the unused modules, but since they are all part of the samelinux-imagepackage in Debian that's hardly an elegant solution.
You do realize that Linux is the operating system powering most of the servers on the internet, right? Linux isn’t just some desktop os with tiny market share.I own a very successful business using Mac's. This restarting/rebooting thing. What is that? According to the Linfets, Linux is totally secure!
In real life, NO operating system is secure. Remember the days when using the 'net was fun? And all we had to worry about was flashing banner ad's? What went wrong....
No. You already get root on an EC2 instance.So if one were to rent an ec2, one could get root and then move laterally through AWS? Is that the thing?
So if one were to rent an ec2, one could get root and then move laterally through AWS? Is that the thing?
It's also nasty if you're, say, a community-based Linux distribution with a shared server that anyone with a project account can ssh into. And an infrastructure setup where there's a server that a larger group of semi-trusted people have user-only access to, but a smaller group of trusted people have root access to, from which you can access any other server as root if you're root, but not if you're only a user.No - your EC2 instance doesn’t share a kernel memory space with the host hypervisor, and these attacks work by getting something into the kernel’s cache and then modifying it so e.g. when it next executed /bin/su the code which actually runs is not what it originally loaded from the file system.
What this is nasty for are things like CI/CD servers or platform-as-a-service companies where untrusted code runs on the same kernel across multiple users.
There's a recent "killswitch" proposal (https://lore.kernel.org/all/20260507070547.2268452-1-sashal@kernel.org/) that might be helpful if it's adopted.Both this and copyfail use kernel extensions that I have no use for on my servers. These exploits demonstrate that keeping around unused kernel modules increases attack surface. Disabling them the moment an exploit is announced is the best I can do right now, but what happens when a bad actor finds one of these first rather than a security researcher?
Maybe if these sort of exploits continue showing up with some regularity Linux will get a mechanism to only allow modules that are explicitly whitelisted, rather than the modprobe blacklist mechanism? Or maybe there's already a way to do this? I mean, one can simply delete the unused modules, but since they are all part of the samelinux-imagepackage in Debian that's hardly an elegant solution.
I was assured that AI was going to bring us more secure and reliable software, not first to successfully attack existing security protection.Anonymously I presume?
Are we going to see a tsunami of these, with AI code review? Can't find any indication that's how this exploit(s) was discovered, other than being inspired by CopyFail, but seems likely.
Why would anyone expect it to do one without also doing the other? Like so many things, it's just a tool, if a particularly powerful one. Whether it's used for good or ill is up to the person using it.I was assured that AI was going to bring us more secure and reliable software, not first to successfully attack existing security protection.
Oh well.
It will do that, but there will also be a lot of new exploits discovered. The hope is that the overall balance tips towards security for a change, because once the low-hanging fruit are caught out by early models, the resources to run the really advanced models will mostly only be available to white-hat hackers.I was assured that AI was going to bring us more secure and reliable software, not first to successfully attack existing security protection.
Oh well.
I worked on Windows Update for a big chunk of my career at Microsoft. Which meant that I worked on scheduling/downloading/staging the updates; I didn't work on the Component-Based Servicing, the code that actually installed Windows patches. But I certainly got to talk with the folks who did.You mean don’t enjoy 3 or more nested reboots during Windows patches? I always assume it’s the cold revenge for not having to reboot after every app install anymore.
What, pray tell, is a "Linfet"? Sounds pejorative. Given the context, I doubt it's a linear field-effect transistor.I own a very successful business using Mac's. This restarting/rebooting thing. What is that? According to the Linfets, Linux is totally secure!
My biggest worry when I read these is cloud - not mine but my banks, etc."The best response for anyone using Linux is to install patches immediately. While fixes likely require a reboot, protection from a threat as severe as Dirty Frag outweighs the cost of disruptions."
Honestly, as a distro maintainer (I'm the Fedora quality team lead), I would take a less urgent line than this for most folks. For single-user systems a root privilege escalation vuln is not really a huge deal. You are relatively unlikely to be vulnerable to it (because untrusted parties likely don't have shell access to your system), and root privilege separation is less of a big deal to you; the most likely user account to be compromised on your system is your own, and that's already where all your stuff is. If somebody compromises your user account they don't need a root privilege escalation exploit to do bad stuff to you.
This class of vuln is much worse news for anyone administering a system with multiple users. (Though I don't think it's been indicated that this one is usable for container or VM escape in common scenarios, which is a blessing).
The unfounded panic over VMs is just the tip of the iceberg. Sadly, this piece demonstrates a worse-than-LLM level of technical comprehension, reading more like a mad-libs of security buzzwords than a factual vulnerability breakdown.Yeah, the Google page Dan links to provides absolutely no reasoning for mentioning virtual machines.
Yeah, the Google page Dan links to provides absolutely no reasoning for mentioning virtual machines.
However, there is a significant hurdle: the exploit usually requires high-level system permissions, such as CAP_NET_ADMIN. This means exploitation is less likely in hardened containerized environments (e.g., Kubernetes with default seccomp profiles). However, the risk remains significant for virtual machines or less restricted environments.
The rest of your post was some nice insight, thanks!(For those who don't remember: It used to be that very little of the installation work happened until you restarted. Which meant that updates could take well over five minutes on slow hard drives.
The unfounded panic over VMs is just the tip of the iceberg. Sadly, this piece demonstrates a worse-than-LLM level of technical comprehension, reading more like a mad-libs of security buzzwords than a factual vulnerability breakdown.
The author fundamentally conflates a standard Local Privilege Escalation (LPE) with a hypervisor breakout. If a standard user exploits CVE-2026-43284 inside a virtual machine, they get root on that specific guest OS, not the underlying bare-metal host. Even the container threat model is butchered... unless a container is already running privileged or the attacker chains this with a distinct container escape, gaining root inside a restricted namespace doesn’t magically hand over the host kernel.
I hate to say it, but you could feed the raw Microsoft Threat Intel report to an LLM and get a far more coherent, technically accurate summary than what was published here. I understand the pressure of rapid-turnaround security journalism, but prioritizing speed over basic mechanical comprehension does a massive disservice to readers who actually need to assess their infrastructure risk.
It doesn't universally disable unprivileged namespace creation, there is a sysctl for that. Instead it allows enabling unprivileged user namespaces on a per application basis. So Firefox gets a profile that allows it to create unprivileged user namespaces allowing it to create its sandbox, but arbitrary applications don't have that privilege."Some Ubuntu configurations use AppArmor to prevent untrusted users from creating namespace contents. That, in turn, neutralizes the ESP technique." My stock Ubuntu 26.04 laptop allows creating unprivileged user name spaces -- as an experiment I tried disabling that feature (as per https://access.redhat.com/security/vulnerabilities/RHSB-2026-003) and it broke Firefox sandboxing. Which pretty much breaks Firefox, period.
I think it's important to distinguish between a VM itself being vulnerable, and escaping a VM to the Host and/or it's other VM's being possible.You, and the people upvoting you, should actually read the part of the post that says: