Back

Tails 7.7.3 Emergency Update Addresses DirtyFrag Vulnerability

Severity: High (Score: 72.3)

Sources: Blog.Torproject, tails.net, Heise.De

Summary

An emergency update for Tails, the Linux distribution for anonymous browsing, has been released to fix a critical vulnerability in the Linux kernel known as DirtyFrag (CVE-2026-43284). This vulnerability could allow local attackers to escalate privileges and potentially deanonymize users. The update, version 7.7.3, also includes updates for the Tor Browser, Tor client, and Thunderbird. Users are urged to apply this update immediately, especially those running Tails from USB sticks. Other affected systems include NAS devices from Qnap, which are investigating their vulnerabilities related to DirtyFrag. Synology has reported that its products are not affected by these vulnerabilities. No active exploitation of the DirtyFrag vulnerability has been confirmed in the wild as of now. Key Points: • Tails 7.7.3 fixes the critical DirtyFrag vulnerability allowing privilege escalation. • Users are advised to update immediately to prevent potential deanonymization. • Qnap is investigating vulnerabilities related to DirtyFrag, while Synology reports no impact.

Key Entities

  • CVE-2026-43284 (cve)
  • CVE-2026-43500 (cve)
  • CWE-269 - Improper Privilege Management (cwe)
  • T1068 - Exploitation for Privilege Escalation (mitre_attack)
  • Linux (platform)
  • Tails (platform)
  • Thunderbird (platform)
  • Tor Browser (platform)
  • Tor Client (platform)
  • Copy Fail (vulnerability)
  • Dirty Frag (vulnerability)
  • DirtyFrag (vulnerability)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed