Fedora pushed kernel 7.0.4 to stable to fix the Dirty Frag and Copy Fail 2 vulnerabilities. Both CVE-2026-43284 and CVE-2026-43500 Patched.

Full details here: https://ostechnix.com/fedora-44-kernel-7-0-4-dirty-frag-copy-fail-2-fix/

#Fedora44 #Linuxkernel704 #DirtyFrag #CopyFail2 #CVE_2026_43284 #CVE_2026_43500

Fedora 44 Gets Kernel 7.0.4: Dirty Frag and Copy Fail 2 Fixed - OSTechNix

Fedora pushed kernel 7.0.4 to stable to fix the Dirty Frag and Copy Fail 2 vulnerabilities. Both CVE-2026-43284 and CVE-2026-43500 Patched.

OSTechNix
'Dirty Frag' Linux flaw one-ups CopyFail with no patches and public root exploit

Broken disclosure embargo left admins facing a fresh root-level flaw with no CVE

theregister

CVE-2026-43284 / "Dirty Frag" .. Antoher one of those nasty local-privilege-escallations.

Quickfix for Centos/Fedora based systems:

printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf && rmmod esp4 esp6 rxrpc 2>/dev/null; true

Caution: That also effectively disables IPSEC and AFS client support. But it can easily be reverted by removing the file when a patched kernel arrives.

#dirtyfrag #cve_2026_43284 #security #centos #fedora #redhat

📱 Dirty Frag : deux vulnĂ©rabilitĂ©s Linux permettent l'Ă©lĂ©vation de privilĂšges root (CVE-2026-43284 / CVE-2026-43500)
📝 ## 🔍 Contexte

Publié le 8 mai 2026 sur GitHub par le chercheur Hyunwo...
📖 cyberveille : https://cyberveille.ch/posts/2026-05-08-dirty-frag-deux-vulnerabilites-linux-permettent-l-elevation-de-privileges-root-cve-2026-43284-cve-2026-43500/
🌐 source : https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md
#CVE_2026_43284 #CVE_2026_43500 #Cyberveille

Dirty Frag : deux vulnérabilités Linux permettent l'élévation de privilÚges root (CVE-2026-43284 / CVE-2026-43500)

🔍 Contexte PubliĂ© le 8 mai 2026 sur GitHub par le chercheur Hyunwoo Kim (@v4bel), ce write-up technique dĂ©taille Dirty Frag, une classe de vulnĂ©rabilitĂ©s Linux permettant d’obtenir les privilĂšges root sur la majoritĂ© des distributions Linux en chaĂźnant deux primitives d’écriture arbitraire en page cache. đŸ§© VulnĂ©rabilitĂ©s impliquĂ©es Dirty Frag repose sur deux vulnĂ©rabilitĂ©s distinctes : CVE-2026-43284 — xfrm-ESP Page-Cache Write : Dans esp_input(), lorsqu’un skb non-linĂ©aire sans frag_list est traitĂ©, le code contourne skb_cow_data() et effectue un dĂ©chiffrement AEAD en place directement sur la page cache. Via splice(), un attaquant peut planter une page cache en lecture seule dans le frag du skb. La fonction crypto_authenc_esn_decrypt() effectue un STORE de 4 octets contrĂŽlĂ©s (via seq_hi de l’attribut XFRMA_REPLAY_ESN_VAL) Ă  un offset de fichier choisi. L’authentification AEAD Ă©choue mais le STORE est dĂ©jĂ  persistĂ©. NĂ©cessite CAP_NET_ADMIN (user namespace suffisant).

CyberVeille

Apparently there's yet another #LinuxKernel Local Privilege Escalation #vulnerability. There's a mitigation that disables esp4, esp6 and rxrpc modules.

https://www.openwall.com/lists/oss-security/2026/05/07/8

https://github.com/V4bel/dirtyfrag

EDIT: The related vulnerabilities are now tracked as CVE-2026-43284 and CVE-2026-43500. https://nvd.nist.gov/vuln/detail/CVE-2026-43284 https://nvd.nist.gov/vuln/detail/CVE-2026-43500

#infosec #cybersecurity #CVE_2026_43284 #CVE_2026_43500

oss-security - Dirty Frag: Universal Linux LPE