Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    aria2c Improper Certificate Validation – Research Advisory

    May 13, 2026

    PSIRT | FortiGuard Labs

    May 13, 2026

    Windows BitLocker zero-day gives access to protected drives, PoC released

    May 13, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»Alerts»AL26-011 – Vulnerabilities affecting Linux – CVE-2026-43284 and CVE-2026-43500
    Alerts

    AL26-011 – Vulnerabilities affecting Linux – CVE-2026-43284 and CVE-2026-43500

    adminBy adminMay 8, 2026No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Number: AL26-011
    Date: May 8, 2026

    Audience

    This Alert is intended for IT professionals and managers.

    Purpose

    An Alert is used to raise awareness of a recently identified cyber threat that may impact cyber information assets, and to provide additional detection and mitigation advice to recipients. The Canadian Centre for Cyber Security (Cyber Centre) is also available to provide additional assistance regarding the content of this Alert upon request.

    Details

    The Cyber Centre is aware of security vulnerabilities affecting Linux-based operating systems, identified as CVE-2026-43284Footnote 1 and CVE-2026-43500Footnote 2.

    Tracked as CVE-2026-43284, this is a Linux kernel Write-what-where Condition vulnerability (CWE-123)Footnote 3 that may allow a local attacker to execute arbitrary code.

    CVE-2026-43500 is a Linux kernel local privilege escalation (LPE) vulnerability in the RxRPC subsystem that may allow a local attacker to escalate privileges.

    Public reporting and Linux kernel security advisoriesFootnote 4Footnote 5Footnote 6Footnote 7Footnote 8Footnote 9 indicate that these vulnerabilities originate in the Linux kernel and may, under certain conditions, allow privilege escalation to root or bypass of isolation mechanisms.

    Publicly referred to as “Dirty Frag”, CVE-2026-43284 and CVE-2026-43500 can be chained to allow for a local unprivileged user to gain root accessFootnote 10. Chained with a remote code execution vulnerability, these vulnerabilities are even more significant and need to be prioritized for patching.

    The Cyber Centre is aware of working publicly available Proof of Concepts (POC) exploiting these vulnerabilitiesFootnote 11.

    Suggested actions

    As of May 8, 2026, no universal fix has been released across all stable kernels for CVE-2026-43284 and CVE-2026-43500.

    The Cyber Centre recommends that organizations identify and apply the recommended mitigations until patches become available.

    Affected environments include, but are not limited to:

    • Enterprise Linux distributions (Red Hat Enterprise Linux, Rocky Linux, AlmaLinux, Oracle Linux, Fedora and CentOS Stream)
    • Debian-based distributions (Debian, Ubuntu)
    • SUSE-based distributions (SUSE Linux Enterprise, openSUSE)
    • Other Linux systems running vulnerable kernel versions

    Organizations should consult their respective distribution maintainers for version-specific impact and mitigation guidance. Organizations can determine whether systems may be affected by CVE-2026-43284 and CVE-2026-43500 in:

    • Identifying the running Linux kernel version using the uname -r command that include:
      • ESP/XFRM IPsec support
      • UDP ESP‑in‑UDP receive paths
      • RXRPC enabled
    • Checking whether the affected kernel modules are currently loaded by running lsmod | egrep ‘^(esp4|esp6|rxrpc)\b’ or grep -qE ‘^(esp4|esp6|rxrpc) ‘ /proc/modules; no output indicates the modules are not currently loaded, but organizations should also confirm whether the modules are available to load and review vendor guidance, as module availability and default exposure vary by distribution.

    Until vendor patches are available, the Cyber Centre recommends that organizations:

    • Disable vulnerable kernel modules (esp, esp6 and rxpc) if not required by running sh -c “printf ‘install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n’ > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true” or distro-specific guidance when availableFootnote 9Footnote 12. Note: Disabling esp4, esp6 may break IPsec. Disabling rxrpc may impact AFS-based systems. Regenerate the initramfs images to prevent the modules from being loaded during early boot by running sudo update-initramfs -u -k all or follow vendor-specific guidance when available
    • Restrict local and remote access to affected systems, particularly in shared or multi-tenant environments
    • Review and limit administrative privileges, including sudo and role-based access
    • Monitor authentication, system, and kernel logs for signs of privilege escalation or abnormal activity

    In addition, the Cyber Centre strongly recommends that organizations review and implement the Cyber Centre’s Top 10 IT Security Actions with an emphasis on the following topicsFootnote 13.

    • Patch operating systems and applications
    • Enforce the management of administrative privileges
    • Harden operating systems and applications
    • Segment and separate information

    Should activity matching the content of this alert be discovered, recipients are encouraged to report via My Cyber Portal, or email contact@cyber.gc.ca.

    References

    Footnote 1

    CVE-2026-43284 Detail

    Return to footnote1 referrer

    Footnote 2

    CVE-2026-43500

    Return to footnote2 referrer

    Footnote 3

    CWE-123: Write-what-where Condition

    Return to footnote3 referrer

    Footnote 4

    “Dirty Frag” and other issues in Amazon Linux kernels

    Return to footnote4 referrer

    Footnote 5

    Debian – CVE-2026-43284

    Return to footnote5 referrer

    Footnote 6

    Red Hat Bugzilla – Bug 2467771

    Return to footnote6 referrer

    Footnote 7

    SUSE Common Vulnerabilities and Exposures – CVE-2026-43284

    Return to footnote7 referrer

    Footnote 8

    Ubuntu – CVE-2026-43284

    Return to footnote8 referrer

    Footnote 9

    Dirty Frag (CVE-2026-43284, CVE-2026-43500) vulnerability fix is ready for testing

    Return to footnote9 referrer

    Footnote 10

    Dirty Frag: Linux Kernel Local Privilege Escalation via ESP and RxRPC

    Return to footnote10 referrer

    Footnote 11

    New Linux ‘Dirty Frag’ zero-day gives root on all major distros

    Return to footnote11 referrer

    Footnote 12

    Dirty Frag Linux kernel local privilege escalation vulnerability mitigations

    Return to footnote12 referrer

    Footnote 13

    Top 10 IT security actions to protect Internet connected networks and information (ITSM.10.089)

    Return to footnote13 referrer



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleCISA Adds One Known Exploited Vulnerability to Catalog
    Next Article Why More Analysts Won’t Solve Your SOC’s Alert Problem
    admin
    • Website

    Related Posts

    Alerts

    aria2c Improper Certificate Validation – Research Advisory

    May 13, 2026
    Alerts

    PSIRT | FortiGuard Labs

    May 13, 2026
    Alerts

    CVE-2026-44572 | THREATINT

    May 13, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202674 Views

    Defending Canada’s Digital Frontier: Combating Phishing, Social Engineering, Ransomware, and Malware

    March 23, 202624 Views

    IP Address Investigations and Local OSINT

    March 20, 202624 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202674 Views

    Defending Canada’s Digital Frontier: Combating Phishing, Social Engineering, Ransomware, and Malware

    March 23, 202624 Views

    IP Address Investigations and Local OSINT

    March 20, 202624 Views
    Our Picks

    aria2c Improper Certificate Validation – Research Advisory

    May 13, 2026

    PSIRT | FortiGuard Labs

    May 13, 2026

    Windows BitLocker zero-day gives access to protected drives, PoC released

    May 13, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.