CVE-2026-43284 - Vulnerability Analysis
HighCVSS: 7.8Last Updated: May 8, 2026
Linux Kernel - Memory Corruption via In-Place ESP Decryption
Published: May 8, 2026Updated: May 8, 2026PoC Available
Overview
Linux kernel contains an in-place decryption vulnerability in xfrm ESP due to missing SKBFL_SHARED_FRAG flag on shared skb fragments in IPv4/IPv6 UDP datagram splicing, letting attackers cause data corruption or memory issues, exploit requires crafted ESP-in-UDP packets with shared pipe pages.
Severity & Score
Severity: High
CVSS Score: 7.8
Impact
Attackers can cause data corruption or memory issues by triggering in-place decryption on shared skb fragments, potentially leading to denial of service or information disclosure.
Mitigation
Update to the latest Linux kernel version containing the fix for SKBFL_SHARED_FRAG flag handling in xfrm ESP.
References
- https://git.kernel.org/stable/c/8253aab4659ca16116b522203c2a6b18dccacea7
- https://git.kernel.org/stable/c/fe785bb3a8096dffcc4048a85cd0c83337eeecad
- https://github.com/V4bel/dirtyfrag
- https://git.kernel.org/stable/c/50ed1e7873100f77abad20fd31c51029bc49cd03
- https://git.kernel.org/stable/c/52646cbd00e765a6db9c3afe9535f26218276034
- https://git.kernel.org/stable/c/71a1d9d985d26716f74d21f18ee8cac821b06e97
- https://git.kernel.org/stable/c/5d55c7336f8032d434adcc5fab987ccc93a44aec
- https://git.kernel.org/stable/c/b54edf1e9a3fd3491bdcb82a21f8d21315271e0d
- http://www.openwall.com/lists/oss-security/2026/05/08/7
- https://git.kernel.org/stable/c/a6cb440f274a22456ef3e86b457344f1678f38f9
- https://git.kernel.org/stable/c/ab8b995323e5237041472d07e5055f5f7dcdf15b
Related Resources
Details
- CVE ID
- CVE-2026-43284
- Severity
- High
- CVSS Score
- 7.8
- Type
- undefined
- Status
- modified
CWE
- CWE-123
CVSS Metrics
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H