[{"data":1,"prerenderedAt":92},["ShallowReactive",2],{"zh-cn:CommonContent:\u002Fnews\u002F2026-05-08-linux-kernel-6.18.27-dirty-frag":3},{"id":4,"title":5,"body":6,"categories":82,"date":84,"description":79,"extension":85,"home":86,"important":86,"meta":87,"navigation":86,"path":88,"seo":89,"stem":90,"__hash__":91},"zhCN\u002Fnews\u002F2026-05-08-linux-kernel-6.18.27-dirty-frag.md","安全公告：Linux 内核本地提权漏洞（代号 Dirty Frag）",{"type":7,"value":8,"toc":78},"minimark",[9,17,47,50,66,69],[10,11,12],"p",{},[13,14],"img",{"alt":15,"src":16},"Linux 内核更新安全公告：本地提权漏洞（代号 Dirty Frag）","\u002Fassets\u002Fnews\u002Fcve-dirty-frag-20260508.webp",[10,18,19,20,27,28,32,33,36,37,40,41,46],{},"2026 年 5 月 8 日，独立安全研究员 Hyunwoo Kim ",[21,22,26],"a",{"href":23,"rel":24},"https:\u002F\u002Fwww.openwall.com\u002Flists\u002Foss-security\u002F2026\u002F05\u002F07\u002F8",[25],"nofollow","披露了"," Linux 内核 ",[29,30,31],"code",{},"esp4","、",[29,34,35],{},"esp6"," 及 ",[29,38,39],{},"rxrpc"," 模块中的一系列漏洞（CVE-2026-43284 及 CVE-2026-43500，代号 ",[21,42,45],{"href":43,"rel":44},"https:\u002F\u002Fgithub.com\u002FV4bel\u002Fdirtyfrag",[25],"Dirty Frag","），可通过恶意程序实现本地提权。",[10,48,49],{},"目前我们已通过系统更新修补这一漏洞，请参考如下软件版本：",[51,52,53,60],"ul",{},[54,55,56,57],"li",{},"主线发行支持的设备：",[29,58,59],{},"linux+kernel >= 3:6.18.27",[54,61,62,63],{},"Apple silicon 设备：",[29,64,65],{},"linux+kernel+asahi >= 3:6.18.27",[10,67,68],{},"请择机更新您的安同 OS（服务器、多用户或公用设备用户请加急此更新）。",[10,70,71,72,77],{},"如果您在安装该更新过程中遇到问题，或对本安全公告有任何疑问或建议，欢迎您来社区",[21,73,76],{"href":74,"rel":75},"https:\u002F\u002Faosc.io\u002Fcontact",[25],"各聊天群组","与我们联系反馈。",{"title":79,"searchDepth":80,"depth":80,"links":81},"",2,[],[83],"advisories","2026-05-08","md",true,{},"\u002Fnews\u002F2026-05-08-linux-kernel-6.18.27-dirty-frag",{"title":5,"description":79},"news\u002F2026-05-08-linux-kernel-6.18.27-dirty-frag","12OtrRIxDs710MM7Rs4w9qhWG3UHTQG4-nMkkFAWpDg",1778234034035]