XOA vulnerabilty to "copy fail" and "dirty frag" bug
-
There is currently a lot of discussion about the "Copy Fail" vulnerability and the "Dirty Frag" vulnerability.
Copy Fail: https://thehackernews.com/2026/05/cisa-adds-actively-exploited-linux-root.html
Dirty Frag: https://thehackernews.com/2026/05/linux-kernel-dirty-frag-lpe-exploit.htmlAre the XOA appliance (which is based on Debian 12) and XCP-ng vulnerable to these issues?
Should we take any additional mitigation measures?
From what I understand, most Linux distributions already provide a kernel patch for the Copy Fail vulnerability. However, at the time of writing, patches for Dirty Frag do not yet seem to be widely available.
-
Copy Fail is documented in VSA-2026-013, we don't have one for Dirty Frag yet as we're still investigating XCP-ng side regarding it.
For XOA, unattended updates should have installed the patched debian kernel, you just need to reboot it.
Debian security tracker states they are both fixed:
Hello! It looks like you're interested in this conversation, but you don't have an account yet.
Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.
With your input, this post could be even better 💗
Register Login