<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[XOA vulnerabilty to &quot;copy fail&quot; and &quot;dirty frag&quot; bug]]></title><description><![CDATA[<p dir="auto">There is currently a lot of discussion about the "Copy Fail" vulnerability and the "Dirty Frag" vulnerability.</p>
<p dir="auto">Copy Fail: <a href="https://thehackernews.com/2026/05/cisa-adds-actively-exploited-linux-root.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://thehackernews.com/2026/05/cisa-adds-actively-exploited-linux-root.html</a><br />
Dirty Frag: <a href="https://thehackernews.com/2026/05/linux-kernel-dirty-frag-lpe-exploit.html" target="_blank" rel="noopener noreferrer nofollow ugc">https://thehackernews.com/2026/05/linux-kernel-dirty-frag-lpe-exploit.html</a></p>
<p dir="auto">Are the XOA appliance (which is based on Debian 12) and XCP-ng vulnerable to these issues?</p>
<p dir="auto">Should we take any additional mitigation measures?</p>
<p dir="auto">From what I understand, most Linux distributions already provide a kernel patch for the Copy Fail vulnerability. However, at the time of writing, patches for Dirty Frag do not yet seem to be widely available.</p>
]]></description><link>https://xcp-ng.org/forum/topic/12204/xoa-vulnerabilty-to-copy-fail-and-dirty-frag-bug</link><generator>RSS for Node</generator><lastBuildDate>Sat, 09 May 2026 12:58:08 GMT</lastBuildDate><atom:link href="https://xcp-ng.org/forum/topic/12204.rss" rel="self" type="application/rss+xml"/><pubDate>Sat, 09 May 2026 10:49:46 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to XOA vulnerabilty to &quot;copy fail&quot; and &quot;dirty frag&quot; bug on Sat, 09 May 2026 11:30:46 GMT]]></title><description><![CDATA[<p dir="auto">Copy Fail is documented in <a href="https://docs.vates.tech/security/advisories/2026/vates-sa-2026-013/" target="_blank" rel="noopener noreferrer nofollow ugc">VSA-2026-013</a>, we don't have one for Dirty Frag yet as we're still investigating XCP-ng side regarding it.</p>
<p dir="auto">For XOA, unattended updates should have installed the patched debian kernel, you just need to reboot it.</p>
<p dir="auto">Debian security tracker states they are both fixed:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2026-31431" target="_blank" rel="noopener noreferrer nofollow ugc">https://security-tracker.debian.org/tracker/CVE-2026-31431</a></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2026-43284" target="_blank" rel="noopener noreferrer nofollow ugc">https://security-tracker.debian.org/tracker/CVE-2026-43284</a></li>
</ul>
]]></description><link>https://xcp-ng.org/forum/post/105237</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/105237</guid><dc:creator><![CDATA[bleader]]></dc:creator><pubDate>Sat, 09 May 2026 11:30:46 GMT</pubDate></item></channel></rss>