Dirty Frag: Unpatched Linux vulnerability delivers root access
Overview
A new vulnerability in Linux, named 'Dirty Frag', has emerged, specifically affecting the xfrm-ESP and RxRPC modules. One of the flaws, identified as CVE-2026-43284, has already been patched in the Linux kernel, but the second flaw, CVE-2026-43500, remains unpatched. This situation poses a significant risk as attackers can exploit the unpatched vulnerability to gain root access to affected systems. The implications are serious, particularly for organizations using Linux systems that rely on these modules for secure networking. Users and system administrators are urged to apply the latest patches for the patched vulnerability and remain vigilant for updates regarding the unpatched issue.
Key Takeaways
- Affected Systems: Linux systems utilizing xfrm-ESP and RxRPC modules for IPsec protocols.
- Action Required: Apply the latest Linux kernel updates to patch CVE-2026-43284.
- Timeline: Newly disclosed
Original Article Summary
A week after Copy Fail, another Linux local privilege escalation vulnerability dubbed “Dirty Frag” has been revealed, along with a PoC exploit. What is Dirty Frag In effect, Dirty Frag refers to two flaws: A xfrm-ESP Page-Cache Write vulnerability (CVE-2026-43284, aka Copy Fail 2.0), now patched in the Linux kernel, affects the modules supporting one of the protocols used for IPsec A RxRPC Page-Cache Write vulnerability (CVE number reserved: CVE-2026-43500), currently unpatched, affects the modules … More → The post Dirty Frag: Unpatched Linux vulnerability delivers root access appeared first on Help Net Security.
Impact
Linux systems utilizing xfrm-ESP and RxRPC modules for IPsec protocols.
Exploitation Status
The exploitation status is currently unknown. Monitor vendor advisories and security bulletins for updates.
Timeline
Newly disclosed
Remediation
Apply the latest Linux kernel updates to patch CVE-2026-43284. Monitor for updates regarding CVE-2026-43500 and implement security best practices to limit exposure until a patch is available.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Linux, CVE, Exploit, and 2 more.