PT-2026-38680 · Linux · Linux Kernel

Sandipan Roy

·

Published

2026-05-08

·

Updated

2026-05-10

·

CVE-2026-43284

CVSS v3.1

7.8

High

VectorAV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Linux kernel (affected versions not specified)
Description A local privilege escalation issue, known as Dirty Frag, exists in the Linux kernel networking functionality related to xfrm/IPsec ESP and RxRPC. The problem occurs because IPv4/IPv6 datagram append paths fail to set the SKBFL SHARED FRAG flag when splicing pages into UDP skbs. This allows ESP-in-UDP packets made from shared pipe pages to be treated as ordinary uncloned nonlinear skbs. Consequently, the ESP input process uses a fast path that decrypts data in place over memory not privately owned by the skb, leading to a page cache write error. A local unprivileged attacker can abuse these paths to modify page cache contents and escalate privileges to root.
Recommendations Update the kernel to the latest version provided by the vendor. As a temporary mitigation, disable the esp4, esp6, and rxrpc kernel modules if they are not required. Restrict the use of the kafs module as it depends on the vulnerable components.

Exploit

Fix

LPE

Use After Free

Weakness Enumeration

Related Identifiers

ALSA-2026:A004
ALSA-2026:A005
ALSA-2026:A006
ALSA-2026:A007
CVE-2026-43284
ECHO-C2C0-9DB5-201C

Affected Products

Linux Kernel