Dirty Frag security flaw

Fyi there is a new problem in the linux kernel similar to Copy Fail that was fixed a few days ago. Unfortunately there is again an exploit published

The current 16.0 kernel 6.12.0-160000.29-default and the current Tumbleweed kernel 7.0.3-1-default are affected. For mitigation create a file /etc/modprobe.d/10-dirtyfrag.conf with content

blacklist esp4
install esp4 /bin/false
blacklist esp6
install esp6 /bin/false
blacklist rxrpc
install rxrpc /bin/false

and then unload these modules or reboot. Please be aware that this mitigation will break IPSEC VPN that use the ESP protocol. There is no CVE number as fa as i know for this.

1 Like

CVE-2026-43284
https://bugzilla.opensuse.org/show_bug.cgi?id=1264449

2 Likes

@rawar:

<https://www.suse.com/security/cve/CVE-2026-43284.html>

2 Likes