Dirty Frag Mitigation (CVE-2026-43284, CVE-2026-43500)¶
Warning
Vendor patches are not widely available, please apply the mitigation to vulnerable hosts.
We have learned that a new vulnerability called Dirty Frag (CVE-2026-43284 and CVE-2026-43500) has leaked to the public. Due to an unplanned leak, official patches are not widely available.
References and Further Reading¶
General Information & Exploit Details
Vendor Specific Information
| Vendor | Status | Resource |
|---|---|---|
| AlmaLinux | ✅ Patches Released | Dirty Frag (CVE-2026-43284, CVE-2026-43500) Patches Released |
| Red Hat | ⚠️ Vulnerable | CVE-2026-43284 Security Portal |
| Ubuntu | ⚠️ Vulnerable | CVE-2026-43284 Security Advisory |
| Debian | ✅ Patches Released | Security Tracker CVE-2026-43284 |
| SUSE | 🟡 Partial Patches Released | Security Vulnerability CVE-2026-43284 |
Vulnerability Testing¶
Run this command to test if your system is currently vulnerable to the exploit:
unshare -Urn -- ip xfrm state add \
src 10.0.0.1 dst 10.0.0.2 \
proto esp spi 0x00000001 \
mode transport \
enc 'cbc(aes)' 0x00112233445566778899aabbccddeeff00112233445566778899aabbccddeeff \
auth 'hmac(sha1)' 0x00112233445566778899aabbccddeeff00112233
If the output is empty - the system is vulnerable.
If the output is an error message - the system is safe.
Fix for all Linux distributions¶
Blacklisting and removing vulnerable modules¶
Danger
-
Blacklisting
esp4andesp6will cause all IPsec-based VPNs and encrypted tunnels to stop working.-
This breakage only applies to the temporary mitigation (the module blacklisting workaround).
-
Once a fix has been released by your Linux distribution, install it. You can then safely remove the module blacklisting.
-
-
The
rmmodcommand will fail if IPsec is currently active or if the modules are being used by another process. Ifrmmodfails, a reboot is required after creating the blacklist file to ensure the modules are not loaded.
-
Run:
sudo sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true" -
This creates a file
/etc/modprobe.d/dirtyfrag.confwith the following contents:install esp4 /bin/false install esp6 /bin/false install rxrpc /bin/false -
Test with the provided command.