Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    Laserfiche unveils AI agents for natural language workflows

    May 12, 2026

    What is it and How to Use it?

    May 12, 2026

    Linux bitten by second severe vulnerability in as many weeks

    May 12, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Linux bitten by second severe vulnerability in as many weeks
    Linux bitten by second severe vulnerability in as many weeks
    Tech Reviews

    Linux bitten by second severe vulnerability in as many weeks

    gvfx00@gmail.comBy gvfx00@gmail.comMay 12, 2026No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Both privilege escalation vulnerabilities stem from bugs in the kernel’s handling of page caches stored in memory, allowing untrusted users to modify them. They target caches in networking and memory-fragment handling components. Specifically, CVE-2026-43284 attacks the esp4 and esp6 () processes, and CVE-2026-43500 zeroes in on rxrpc. Last week’s CopyFail exploited faulty page caching in the authencesn AEAD template process, which is used for IPsec extended sequence numbers. A 2022 vulnerability named Dirty Pipe also stemmed from flaws that allow attackers to overwrite page caches.

    Researchers from security firm Automox wrote:

    Dirty Frag belongs to the same bug family as Dirty Pipe and Copy Fail, but it targets the frag member of the kernel’s struct sk_buff rather than pipe_buffer. The exploit uses splice() to plant a reference to a read-only page-cache page (for example, /etc/passwd or /usr/bin/su) into the frag slot of a sender-side skb. Receiver-side kernel code then performs in-place cryptographic operations on that frag, modifying the page cache in RAM. Every subsequent read of the file sees the corrupted version, even though the attacker only ever had read access.

    CVE-2026-43284 is found in the esp_input() process on the IPsec ESP receive path. When an skb object is non-linear but lacks a frag list, the code skips skb_cow_data() and decrypts AEAD in place on the planted frag. From there, an attacker can control the file offset and the 4-byte value of each store.

    CVE-2026-43500, meanwhile, resides in rxkad_verify_packet_1(). The process decrypts RxRPC payloads using a single-block process. Splice-pinned pages become both a source and destination. That, paired with the decryption key being freely extracted using the add_key (rxrpc), allows an attacker to rewrite contents in memory.

    Either exploit used separately is unreliable. Some Ubuntu configurations use AppArmor to prevent untrusted users from creating namespace contents. That, in turn, neutralizes the ESP technique. Most other distributions by default don’t run rxrpc.ko, which neutralizes the RxRPC arm. When chained together, however, the two exploits allow attackers to obtain root on every major distribution Kim tested. Once the exploits run, attackers can use SSH access, web-shell execution, container escapes, or compromise low-privilege accounts.

    “Dirty Frag is notable because it introduces multiple kernel attack paths involving rxrpc and esp/xfrm networking components to improve exploitation reliability,” Microsoft researchers wrote. “Rather than relying on narrow timing windows or unstable corruption conditions often associated with Linux local privilege escalation exploits, Dirty Frag appears designed to increase consistency across vulnerable environments.”

    Researchers at Google-owned Wiz said exploits will be less likely to break out of hardened containerized environments such as Kubernets with default security settings in place. “However, the risk remains significant for virtual machines or less restricted environments.”

    The best response for anyone using Linux is to install patches immediately. While fixes likely require a reboot, protection from a threat as severe as Dirty Frag outweighs the cost of disruptions. Anyone who can’t install immediately should follow the mitigation steps laid out in the posts linked above. Additional guidance can be found here.

    Table of Contents

    Toggle
      • Related posts:
    • How Wi-Fi Works vs. False Marketing 101: Real-World Tips
    • Meta has closed three VR studios as part of its metaverse cuts
    • Apple will start making Mac minis in the US

    Related posts:

    Microsoft debuts its first in-house AI image generator

    Anthropic says its new AI model “maintained focus” for 30 hours on multistep tasks

    Network Switches 101: The Variety and Quick Shopping Tips

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleNew Texas Chainsaw Massacre movie’s inspiration revealed by Obsession director
    Next Article What is it and How to Use it?
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    Sony’s New Wearable Air Conditioner Runs Even Cooler

    May 12, 2026
    Tech Reviews

    ‘The Rings of Power’: Here’s When Season 3 Hits Prime Video

    May 12, 2026
    Tech Reviews

    What is the release date for Half Man episode 4 on HBO Max and BBC iPlayer?

    May 11, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025150 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202583 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202576 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025150 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202583 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202576 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.