CVE-2026-43500 - Vulnerability Analysis
HighCVSS: 7.8Last Updated: May 11, 2026
Linux Kernel - Memory Handling Vulnerability
Overview
Linux kernel contains a memory handling vulnerability in rxrpc_input_call_event() and rxrpc_verify_response() caused by improper unsharing of DATA/RESPONSE packets with paged fragments, letting attackers potentially cause memory corruption, exploit requires crafted network packets.
Severity & Score
Impact
Attackers can cause memory corruption leading to potential denial of service or code execution.
Mitigation
Update to the latest Linux kernel version containing the fix.
References
- https://github.com/V4bel/dirtyfrag
- https://securityonline.info/the-cve-watchtower-weekly-threat-intelligence-briefing-may-4-may-10-2026/
- https://git.kernel.org/stable/c/3eae0f4f9f7206a4801efa5e0235c25bbd5a412c
- https://git.kernel.org/stable/c/aa54b1d27fe0c2b78e664a34fd0fdf7cd1960d71
- https://git.kernel.org/stable/c/d45179f8795222ce858770dc619abe51f9d24411
Social Media Activity(9 posts)
Dirty Frag: Linux Kernel Local Privilege Escalation via ESP and RxRPC Unpatched kernel flaw chain (CVE-2026-43284, CVE-2026-43500) enables root escalation on major Linux distributions. https://www.wiz.io/blog/dirty-frag-linux-kernel-local-privilege-escalation-via-esp-and-rxrpc
View original post🟠 CVE-2026-43500 - High (7.8) In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE handler in rxrpc_verify_response() co... 🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43500/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postI upgraded my kernel for Copy Fail (CVE-2026-31431) not that long ago. Now I am upgrading again for Dirty Frag (CVE-2026-43284 and CVE-2026-43500). I hope things calm down a bit now but I guess we shall see…
View original postDirty Frag (CVE-2026-43284, CVE-2026-43500): Frequently asked questions about this Linux kernel privilege escalation vulnerability chain Weeks after the Copy Fail vulnerability was revealed, a new ... https://www.tenable.com/blog/dirty-frag-cve-2026-43284-cve-2026-43500-frequently-asked-questions-linux-kernel-lpe | https://awakari.com/sub-details.html?id=linux | https://awakari.com/pub-msg.html?id=YrumUmwcLLTdtws0xFlKmi9vbbk&interestId=linux
View original postTwo stable kernels with Dirty Frag fixes Greg Kroah-Hartman has released the 7.0.6 and 6.18.29 stable kernels with Hyunwoo Kim's patch for the second vulnerability ( CVE-2026-43500 ) reported w... https://lwn.net/Articles/1072311/ | https://awakari.com/sub-details.html?id=linux | https://awakari.com/pub-msg.html?id=QRMJmGt4T8eIl7bg5WQYFfpDDl2&interestId=linux
View original post🟠 CVE-2026-43500 - High (7.8) In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE handler in rxrpc_verify_response() co... 🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43500/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postI upgraded my kernel for Copy Fail (CVE-2026-31431) not that long ago. Now I am upgrading again for Dirty Frag (CVE-2026-43284 and CVE-2026-43500). I hope things calm down a bit now but I guess we shall see…
View original postDirty Frag (CVE-2026-43284, CVE-2026-43500): Mitigation and Kernel Update on CloudLinux A week after Copy Fail (CVE-2026-31431), researcher Hyunwoo Kim disclosed a second Linux kernel local privil... https://mastodon.social/tags/KernelCare https://mastodon.social/tags/CVE https://mastodon.social/tags/Vulnerability https://mastodon.social/tags/Kernel https://mastodon.social/tags/Update https://mastodon.social/tags/AlmaLinux https://mastodon.social/tags/CloudLinux https://blog.cloudlinux.com/dirty-frag-mitigation-and-kernel-update | https://awakari.com/sub-details.html?id=linux | https://awakari.com/pub-msg.html?id=Ufc8eyi0bZFrULd6QZ0Y9dCKGcC&interestId=linux
View original postDirty Frag (CVE-2026-43284, CVE-2026-43500): Frequently asked questions about this Linux kernel privilege escalation vulnerability chain Weeks after the Copy Fail vulnerability was revealed, a new ... https://www.tenable.com/blog/dirty-frag-cve-2026-43284-cve-2026-43500-frequently-asked-questions-linux-kernel-lpe | https://awakari.com/sub-details.html?id=linux | https://awakari.com/pub-msg.html?id=FNDUVq4xr5Urwt6G4up1PilKbiq&interestId=linux
View original postGitHub Repositories(13 repos)
- https://github.com/XRSecCD/202605_dirty_frag
- https://github.com/AK777177/Dirty-Frag-Analysis
- https://github.com/krisiasty/vcheck
- https://github.com/gagaltotal/CVE-2026-43284-CVE-2026-43500-scan
- https://github.com/metalx1993/dirtyfrag-patches
- https://github.com/vorkampfer/dirty_frag_mitigation
- https://github.com/mym0us3r/DIRTY-FRAG-Detection-with-Wazuh-4.14.4
- https://github.com/0xlane/pagecache-guard
- https://github.com/liamromanis101/DirtyFrag-Detector
- https://github.com/haydenjames/dirty-frag-check
- https://github.com/attaattaatta/CVE-2026-43500
- https://github.com/linnemanlabs/dirtyfrag-arm64
- https://github.com/KaraZajac/DIRTYFAIL
Related Resources
Details
- CVE ID
- CVE-2026-43500
- Severity
- High
- CVSS Score
- 7.8
- Type
- undefined
- Status
- modified
- EPSS
- 1.0%
- Social Posts
- 9
CWE
- CWE-787
CVSS Metrics
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H