12 min read
By: RedLegg's Cyber Threat Intelligence Team
About:
CVE-2026-43284 is a local privilege escalation vulnerability in the Linux kernel related to xfrm and ESP shared skb fragment handling. The flaw can lead to memory corruption and unsafe page-cache manipulation conditions within the kernel.
An attacker with local access to a vulnerable Linux system may exploit this vulnerability to escalate privileges and gain root-level access. Public proof-of-concept exploit code is available as part of the “Dirty Frag” exploitation chain, and active exploitation in the wild has been confirmed.
RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide additional value to our customers. These emergency bulletins describe vulnerabilities or threats we classify as the highest severity level and warrant out-of-band emergency patching or mitigation action.
VULNERABILITIES
Local Privilege Escalation Vulnerability in Linux Kernel xfrm ESP Handling
CVSS Score: 7.8 (High, CVSS v3.0)
Identifier: CVE-2026-43284
PoC or Exploitation:
Public proof-of-concept exploit code is available as part of the "Dirty Frag" exploitation chain. There are confirmed reports of active exploitation in the wild.
Update/ Patch:
Mitigation Recommendation:
Local Privilege Escalation Vulnerability in Linux Kernel RxRPC Paged Fragment Handling
CVSS Score: 7.8 (High, CVSS v3.0)
Identifier: CVE-2026-43500
PoC or Exploitation:
- Debian tracking and security updates
- Ubuntu security tracking and mitigation guidance
- Red Hat mitigation guidance and package tracking
- CloudLinux and KernelCare livepatch rollout guidance
Mitigation Recommendation: