Join us at AlmaLinux Day: Los Angeles on July 18!  |  Fragnesia (CVE-2026-46300) patches in testing!  |  ssh-keysign-pwn (CVE-2026-46333) patches in testing!
All blog posts

Dirty Frag (CVE-2026-43284, CVE-2026-43500) Patches Released

profile
Andrew Lukoshko

AlmaLinux Lead Architect and ALESCo Chairman

Update: Patched kernels are now in production

2026-05-08 15:22 UTC — The patched kernels are now rolling out to production repositories/mirrors. You no longer need to enable the testing repo to get them. Just run:

sudo dnf clean metadata && sudo dnf upgrade
sudo reboot

Most mirrors have a sync frequency of 3 hours. If the updates are not available to you yet we recommend trying again in about an hour.

The testing-repo instructions further down in this post remain for reference but are no longer the recommended path.

The kernels released to production repositories are bit for bit identical to those from testing. We’d like to thank everyone who helped verify them — community testing got these patches into production faster than we could have managed alone.


The Announcement

A week after Copy Fail, researcher Hyunwoo Kim disclosed a second Linux kernel flaw in the same broad area — IPsec ESP and rxrpc — that they have named Dirty Frag. The bug lives in the in-place decryption fast paths of esp4, esp6, and rxrpc: when a socket buffer carries paged fragments that are not privately owned by the kernel (e.g. pipe pages attached via splice(2)/sendfile(2)/MSG_SPLICE_PAGES), the receive path decrypts directly over those externally-backed pages, exposing or corrupting plaintext that an unprivileged process still holds a reference to.

Like the previous Copy Fail vulnerability, Dirty Frag immediately yields root on all major distributions. Every supported AlmaLinux release is affected. Dirty Frag chains two distinct kernel bugs, each with its own CVE: CVE-2026-43284 covers the IPsec ESP half (esp4 / esp6), and CVE-2026-43500 (NVD entry pending) covers the rxrpc half. Per Hyunwoo Kim’s public disclosure on oss-security (2026-05-07), the responsible-disclosure embargo was broken before distributions could coordinate, and a working exploit is publicly available. A second public exploit, Copy Fail 2: Electric Boogaloo, targets the same vulnerability under a different name; both reach root through the same esp4/esp6/rxrpc code paths and are blocked by the same fix.

If you run AlmaLinux on a multi-tenant host, container build farm, CI runner, or any system where untrusted users can get a shell, this one matters — and with public exploit code in the wild, it matters today.

More information about the vulnerability:

Patching ahead of our upstream

Security is a top priority at AlmaLinux, and the severity of this flaw — combined with how trivial it is to exploit — meant we did not want to wait. Patches are not yet available from Red Hat, so our core team has built patched kernels using the upstream ESP fix (mainline commit f4c50a4034e6) backported and adapted to each supported AlmaLinux branch. The decision to ship these ahead of a CentOS Stream / RHEL update was made by our technical steering committee, ALESCo.

These kernels are available in the testing repository today. After the community has helped verify them, we will release them to the production repositories. This blog post will be updated when that happens.

Help us test

It only takes a few steps to install and test the patched kernel from the testing repo.

Install the testing repo

sudo dnf install -y almalinux-release-testing

Update the kernel

sudo dnf update 'kernel*' --enablerepo=almalinux-testing

Reboot to load the new kernel

sudo reboot

Confirm you are running the patched kernel

The patched kernel versions are listed below. Use either of these commands:

uname -r
rpm -q kernel

We don’t recommend keeping the testing repo enabled after you’ve updated, unless you’ve done this on a truly non-production environment. If this is a production environment, you can disable the repo with this command:

sudo dnf config-manager --disable almalinux-testing

If you encounter problems, please let us know as soon as you can, either in AlmaLinux chat, on bugs.almalinux.org.

A note for AlmaLinux Kitten 10 users

AlmaLinux Kitten 10 is itself a development release and does not have a separate testing repository. The patched kernel is shipping directly to Kitten’s regular repository, so there is nothing extra to enable — just update and reboot:

sudo dnf update 'kernel*'
sudo reboot

Confirm with uname -r against the Kitten version listed below.

Affected versions and patched kernels

All supported AlmaLinux releases (8, 9, 10) are affected by CVE-2026-43284 — the IPsec ESP half — through esp4/esp6, which are part of the standard kernel package on every release.

CVE-2026-43500 — the rxrpc half — additionally affects AlmaLinux 9 and 10, but only on systems that have installed the kernel-modules-partner package. That package ships rxrpc.ko and lives in the AlmaLinux Devel repository, which is not part of the official AlmaLinux repositories — it is publicly available but kept outside the default release set. AlmaLinux 8 does not build the rxrpc module at all and is unaffected by CVE-2026-43500. If you don’t know what kernel-modules-partner is or whether it’s installed, you almost certainly don’t have it — rpm -q kernel-modules-partner will tell you.

Patched kernel versions:

  • AlmaLinux 8 is patched in kernel-4.18.0-553.123.2.el8_10 and above (ALSA-2026:A004)
  • AlmaLinux 9 is patched in kernel-5.14.0-611.54.3.el9_7 and above (ALSA-2026:A005)
  • AlmaLinux 10 is patched in kernel-6.12.0-124.55.3.el10_1 and above (ALSA-2026:A006)
  • AlmaLinux Kitten 10 is patched in kernel-6.12.0-226.el10 and above

Temporary mitigation if you cannot reboot yet

If updating and rebooting right now is not an option, you can neutralize the attack surface by blacklisting the affected modules. None of esp4, esp6, or rxrpc are loaded on a typical workload that does not use IPsec transport mode or AFS, so on most systems this is safe to apply immediately:

sudo sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true"

This writes a modprobe config that prevents the three modules from loading, and unloads them if they happen to be loaded already (the rmmod is best-effort and silent if the module isn’t present). The command is safe to run unchanged on all supported releases. To revert, remove /etc/modprobe.d/dirtyfrag.conf.

The Dirty Frag exploit works by corrupting page-cache pages of sensitive files (such as /etc/passwd or /usr/bin/su). If you suspect the system may have already been targeted before you applied the mitigation, drop the page cache so any tampered pages are evicted and the next read comes fresh from disk:

sudo sh -c 'echo 3 > /proc/sys/vm/drop_caches'

This is safe to run on a live system — it only frees clean cache and dentry/inode entries — and pairs well with the blacklist above.

Do not rely on this if you actually use IPsec ESP or AFS/rxrpc — those workloads will break. The proper fix is to install the patched kernel and reboot.

Thanks

Thanks to Hyunwoo Kim for finding, responsibly disclosing, and writing up this vulnerability, and to Steffen Klassert for shepherding the upstream fix through the netdev tree.

Thanks to the AlmaLinux core team for turning around patched builds for every supported release within a day of the upstream fix landing, and to ALESCo for moving quickly to approve shipping ahead of upstream. And thank you in advance to everyone in the community who helps us test these kernels — that’s the part that gets them safely into production.

Stay informed

Remaining aware of these vulnerabilities and acting quickly can keep your system and data safe. Follow the AlmaLinux Blog, join the Mattermost Community Chat, and subscribe to Announce and Security Mailing List to stay informed and updated. We will update this post when the patched kernels move from testing to production.

Changelog

  • 2026-05-08: AlmaLinux errata published on 2026-05-08 for the CVE-2026-43284 (IPsec ESP) fix: ALSA-2026:A004 (AlmaLinux 8), ALSA-2026:A005 (AlmaLinux 9), and ALSA-2026:A006 (AlmaLinux 10). Added the errata references to the “Affected versions and patched kernels” section. The AlmaLinux 10 NVR listed in that section was also corrected to kernel-6.12.0-124.55.3.el10_1, the combined-fix build that shipped to production.

  • 2026-05-08 15:22 UTC — Patched kernels released to the AlmaLinux production repositories. Added a notice at the top of the post directing readers to sudo dnf clean metadata && sudo dnf upgrade instead of the testing-repo flow described below. Post title updated to reflect release.

  • 2026-05-08 11:27 UTC — Added the CVE-2026-43500 (rxrpc) fix on top of the existing CVE-2026-43284 (ESP) fix on AlmaLinux 10; the combined kernel was released to testing as kernel-6.12.0-124.55.3.el10_1. Clarified affected versions: AlmaLinux 8 is only affected by CVE-2026-43284 (no rxrpc module shipped); AlmaLinux 9 and 10 are affected by CVE-2026-43500 only when kernel-modules-partner from the Devel repository is installed.

  • 2026-05-08 10:04 UTC — CVE-2026-43500 has been allocated for the rxrpc half of Dirty Frag.

  • 2026-05-08 09:06 UTC — Noted that the public exploit “Copy Fail 2: Electric Boogaloo” targets the same vulnerability and is blocked by the same fix.

  • 2026-05-08 08:28 UTC — CVE-2026-43284 has been allocated for Dirty Frag.

Zostaňte informovaní!