- Tails just pushed an emergency release, version 7.7.3, to patch Dirty Frag, a critical Linux kernel vulnerability that lets any local user seize full root control of an affected system.
- The flaw hit the public before patches were even ready, after an unrelated third party broke the coordinated embargo on May 7, 2026.
- Tor Browser, the Tor client, and Thunderbird all received security updates in the same release.

Tails just dropped an unscheduled emergency update, and this one is not routine. Version 7.7.3 targets a serious Linux kernel vulnerability called Dirty Frag, assigned CVE-2026-43284 and CVE-2026-43500, that security researchers describe as capable of handing a local attacker complete root access in a single command.
For a privacy-focused operating system built specifically for journalists, activists, and whistleblowers who depend on anonymity, a flaw of this nature demands immediate attention.
Dirty Frag: The Flaw That Broke Its Own Embargo
Dirty Frag is the second major Linux kernel privilege escalation vulnerability disclosed in two weeks, following closely behind Copy Fail (CVE-2026-31431). Security researcher Hyunwoo Kim privately reported both flaws to Linux kernel maintainers on April 29 and 30, 2026, and submitted patches through the proper channels.
The coordinated disclosure process collapsed on May 7, when an unrelated third party publicly released the vulnerability details and a working exploit before any patches were available to users.
The result was that CVE-2026-43500, the RxRPC component of the flaw, landed in the open without a fix. According to SANS ISC handler Yee Ching Tok, neither sub-vulnerability alone provides a reliable path to full root access, but chaining the two together closes each other’s gaps and delivers immediate root escalation across most major Linux distributions. A working proof-of-concept has been publicly available since the embargo broke.
The vulnerability chains two flaws in the Linux kernel’s networking subsystem, specifically in the IPsec ESP modules (esp4, esp6) and the RxRPC module. According to Ubuntu’s security advisory, CVE-2026-43284 carries a CVSS score of 8.8 (HIGH), while CVE-2026-43500 scores 7.8.
High-severity vulnerabilities are also threatening cellular infrastructure. Researchers have uncovered a 5G baseband security flaw that could let hackers take control of devices at the modem level, a different but equally concerning attack vector.
Both Red Hat and Microsoft have already issued advisories, and Microsoft Defender has reported limited in-the-wild activity potentially linked to either Dirty Frag or its predecessor, Copy Fail.
What the Tails 7.7.3 Update Actually Fixes
The Tails team upgraded the Linux kernel to version 6.12.86, which directly addresses Dirty Frag and closes the privilege escalation path. The Tails project explained that an attacker who already managed to exploit a separate unknown vulnerability inside a Tails application could chain it with Dirty Frag to seize complete control of the system and strip away the user’s anonymity entirely. The team confirmed no known exploitation of this flaw inside Tails has occurred as of this release.
The update did not stop at the kernel. Tor Browser moved to version 15.0.12, the Tor client to version 0.4.9.8, and Thunderbird to version 140.10.1, each carrying its own security fixes. For a system where every layer of the stack exists to protect identity, patching all three simultaneously matters.
How to Get the Update
Users running Tails 7.0 or any later version can receive 7.7.3 through the automatic upgrade process. Anyone who cannot complete an automatic upgrade, or whose system fails to start after attempting one, should proceed with a manual upgrade instead.
New users installing Tails onto a fresh USB stick should follow the official installation instructions directly. One important warning: installing 7.7.3 onto an existing USB stick rather than upgrading will erase any Persistent Storage on that drive. Upgrading preserves it; reinstalling does not.
The Tails team’s position is clear. Given that a public working exploit for Dirty Frag exists, that Microsoft has already spotted potential exploitation in the wild, and that Tails users tend to operate in high-risk environments, sitting on an older version is not a viable option. The update is available now, the risk is documented, and the fix takes minutes to apply.