Bug 2467771 (CVE-2026-43284) - CVE-2026-43284 kernel: "Dirty Frag" ESP XFRM variant is a new universal Local Privilege Escalation (LPE) vulnerability in the Linux kernel
Summary: CVE-2026-43284 kernel: "Dirty Frag" ESP XFRM variant is a new universal Local...
Keywords:
Status: NEW
Alias: CVE-2026-43284
Deadline: 2026-05-12
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2467807
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-05-07 16:02 UTC by OSIDB Bzimport
Modified: 2026-05-14 11:12 UTC (History)
23 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:16061 0 None None None 2026-05-11 19:57:00 UTC
Red Hat Product Errata RHSA-2026:16062 0 None None None 2026-05-11 20:15:58 UTC
Red Hat Product Errata RHSA-2026:16100 0 None None None 2026-05-11 22:53:03 UTC
Red Hat Product Errata RHSA-2026:16155 0 None None None 2026-05-13 06:01:33 UTC
Red Hat Product Errata RHSA-2026:16157 0 None None None 2026-05-13 12:42:10 UTC
Red Hat Product Errata RHSA-2026:16160 0 None None None 2026-05-13 01:41:14 UTC
Red Hat Product Errata RHSA-2026:16161 0 None None None 2026-05-13 01:49:11 UTC
Red Hat Product Errata RHSA-2026:16171 0 None None None 2026-05-13 09:19:02 UTC
Red Hat Product Errata RHSA-2026:16180 0 None None None 2026-05-14 11:12:59 UTC
Red Hat Product Errata RHSA-2026:16195 0 None None None 2026-05-12 11:11:51 UTC
Red Hat Product Errata RHSA-2026:16196 0 None None None 2026-05-12 10:22:43 UTC
Red Hat Product Errata RHSA-2026:16201 0 None None None 2026-05-12 11:22:22 UTC
Red Hat Product Errata RHSA-2026:16202 0 None None None 2026-05-12 11:37:52 UTC
Red Hat Product Errata RHSA-2026:16203 0 None None None 2026-05-12 11:03:44 UTC
Red Hat Product Errata RHSA-2026:16204 0 None None None 2026-05-12 11:40:19 UTC
Red Hat Product Errata RHSA-2026:16206 0 None None None 2026-05-12 13:48:02 UTC
Red Hat Product Errata RHSA-2026:16254 0 None None None 2026-05-12 14:15:39 UTC
Red Hat Product Errata RHSA-2026:16312 0 None None None 2026-05-12 23:37:02 UTC
Red Hat Product Errata RHSA-2026:16314 0 None None None 2026-05-12 22:21:03 UTC
Red Hat Product Errata RHSA-2026:16328 0 None None None 2026-05-12 22:16:22 UTC

Description OSIDB Bzimport 2026-05-07 16:02:22 UTC
The “Dirty Frag” vulnerability is a chained local privilege escalation (LPE) issue in the Linux kernel that combines flaws in the ESP/XFRM and RXRPC subsystems to allow an unprivileged local attacker to gain root access on major Linux distributions. The attack abuses kernel page-cache manipulation and network protocol handling to overwrite privileged binaries and execute arbitrary code with elevated privileges. Exploitation differs by distribution: the ESP issue affects systems permitting unprivileged user namespaces, while the RXRPC issue impacts distributions with RXRPC enabled, such as Ubuntu. Together, the vulnerabilities provide broad cross-distribution root compromise capability, with mitigations involving disabling vulnerable kernel modules (esp4, esp6, and rxrpc) until upstream patches are fully merged and deployed.

Comment 5 Yannick Bergeron 2026-05-08 13:08:36 UTC
What is the recommended workaround until a patch is available? RHEL does not load these modules with modprobe

The following command followed by a reboot seems to work: grubby --update-kernel=ALL --args=module_blacklist=esp4,esp6,rxrpc
However, I don't know if it's the recommended solution or if there is one that is better / more safe.

https://access.redhat.com/security/cve/cve-2026-43284
Also, it does not list RHEL7 as affected or unaffected or under investigation

still no https://access.redhat.com/security/cve/cve-2026-43500 which seems to be another CVE related to dirty frag

Comment 6 Cole Towsley 2026-05-11 17:33:55 UTC
(In reply to Yannick Bergeron from comment #5)
> What is the recommended workaround until a patch is available? RHEL does not
> load these modules with modprobe
> 
> The following command followed by a reboot seems to work: grubby
> --update-kernel=ALL --args=module_blacklist=esp4,esp6,rxrpc
> However, I don't know if it's the recommended solution or if there is one
> that is better / more safe.
> 
> https://access.redhat.com/security/cve/cve-2026-43284
> Also, it does not list RHEL7 as affected or unaffected or under investigation
> 
> still no https://access.redhat.com/security/cve/cve-2026-43500 which seems
> to be another CVE related to dirty frag

Hi Yannick,

The Red Hat Security Bulletin(https://access.redhat.com/security/vulnerabilities/RHSB-2026-003) for this CVE has mitigation steps detailed that should assist while we work on a patch. The CVE page does seem to show both RHEL 6 and 7 as Under Investigation when i look at it, so please check again. If it's still not displaying properly you can reach out to me directly via email and I'll reach out to the team responsible to see if there might be an issue with the back end not displaying correctly.

Comment 7 errata-xmlrpc 2026-05-11 19:56:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2026:16061 https://access.redhat.com/errata/RHSA-2026:16061

Comment 8 errata-xmlrpc 2026-05-11 20:15:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:16062 https://access.redhat.com/errata/RHSA-2026:16062

Comment 9 errata-xmlrpc 2026-05-11 22:53:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:16100 https://access.redhat.com/errata/RHSA-2026:16100

Comment 10 errata-xmlrpc 2026-05-12 10:22:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:16196 https://access.redhat.com/errata/RHSA-2026:16196

Comment 11 errata-xmlrpc 2026-05-12 11:03:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:16203 https://access.redhat.com/errata/RHSA-2026:16203

Comment 12 errata-xmlrpc 2026-05-12 11:11:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:16195 https://access.redhat.com/errata/RHSA-2026:16195

Comment 13 errata-xmlrpc 2026-05-12 11:22:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2026:16201 https://access.redhat.com/errata/RHSA-2026:16201

Comment 14 errata-xmlrpc 2026-05-12 11:37:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:16202 https://access.redhat.com/errata/RHSA-2026:16202

Comment 15 errata-xmlrpc 2026-05-12 11:40:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2026:16204 https://access.redhat.com/errata/RHSA-2026:16204

Comment 16 Michael Colligan 2026-05-12 13:36:51 UTC
Are we still waiting for a kernel fix for the general Red Hat Enterprise Linux 9 channel? I don't see listed above.

Comment 17 errata-xmlrpc 2026-05-12 13:48:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:16206 https://access.redhat.com/errata/RHSA-2026:16206

Comment 18 errata-xmlrpc 2026-05-12 14:15:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:16254 https://access.redhat.com/errata/RHSA-2026:16254

Comment 19 errata-xmlrpc 2026-05-12 22:16:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:16328 https://access.redhat.com/errata/RHSA-2026:16328

Comment 20 errata-xmlrpc 2026-05-12 22:21:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2026:16314 https://access.redhat.com/errata/RHSA-2026:16314

Comment 21 errata-xmlrpc 2026-05-12 23:36:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:16312 https://access.redhat.com/errata/RHSA-2026:16312

Comment 22 errata-xmlrpc 2026-05-13 01:41:11 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.18

Via RHSA-2026:16160 https://access.redhat.com/errata/RHSA-2026:16160

Comment 23 errata-xmlrpc 2026-05-13 01:49:09 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.19

Via RHSA-2026:16161 https://access.redhat.com/errata/RHSA-2026:16161

Comment 24 errata-xmlrpc 2026-05-13 06:01:30 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.21

Via RHSA-2026:16155 https://access.redhat.com/errata/RHSA-2026:16155

Comment 25 errata-xmlrpc 2026-05-13 09:18:59 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.16

Via RHSA-2026:16171 https://access.redhat.com/errata/RHSA-2026:16171

Comment 26 errata-xmlrpc 2026-05-13 12:42:07 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.20

Via RHSA-2026:16157 https://access.redhat.com/errata/RHSA-2026:16157

Comment 27 rstannard-mufg 2026-05-13 16:43:46 UTC
(In reply to Cole Towsley from comment #6)
> (In reply to Yannick Bergeron from comment #5)
> > What is the recommended workaround until a patch is available? RHEL does not
> > load these modules with modprobe
> > 
> > The following command followed by a reboot seems to work: grubby
> > --update-kernel=ALL --args=module_blacklist=esp4,esp6,rxrpc
> > However, I don't know if it's the recommended solution or if there is one
> > that is better / more safe.
> > 
> > https://access.redhat.com/security/cve/cve-2026-43284
> > Also, it does not list RHEL7 as affected or unaffected or under investigation
> > 
> > still no https://access.redhat.com/security/cve/cve-2026-43500 which seems
> > to be another CVE related to dirty frag
> 
> Hi Yannick,
> 
> The Red Hat Security
> Bulletin(https://access.redhat.com/security/vulnerabilities/RHSB-2026-003)
> for this CVE has mitigation steps detailed that should assist while we work
> on a patch. The CVE page does seem to show both RHEL 6 and 7 as Under
> Investigation when i look at it, so please check again. If it's still not
> displaying properly you can reach out to me directly via email and I'll
> reach out to the team responsible to see if there might be an issue with the
> back end not displaying correctly.

Our cyber team use qualys to detect that RHEL7 is "vulnerable" despite RH public statement otherwise.
Is it safe to add workarounds to stop qualys noise?
rmmod esp4 esp6 
echo "install esp4 /bin/false" >> /etc/modprobe.d/disable-esp.conf
echo "install esp6 /bin/false" >> /etc/modprobe.d/disable-esp.conf

Comment 28 errata-xmlrpc 2026-05-14 11:12:56 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.12

Via RHSA-2026:16180 https://access.redhat.com/errata/RHSA-2026:16180


Note You need to log in before you can comment on or make changes to this bug.