Security Advisory
Linux Kernel "Dirty Frag" Local Privilege Escalation
A detailed security advisory from Tailwind Resource Group on CVE-2026-43284 (IPsec ESP) and CVE-2026-43500 (RxRPC) — a two-CVE chain in the same architectural bug class as Copy Fail.
-
Critical Security Insights
Why your existing Copy Fail mitigation does not cover Dirty Frag, and what the multi-tenant Kubernetes blast radius actually looks like.
-
Patch-Window Mitigation
Modprobe-deny for
esp4,esp6, andrxrpcuntil your distro ships a fixed kernel. Carve-outs documented for IPsec and AFS hosts. -
Expert Analysis
Three CVEs in the in-place decryption bug class in nine days. CISA KEV trajectory, BOD 22-01 math, and detection signals worth instrumenting now.
TAILWIND
Resource Group
Security Advisory
Linux Kernel "Dirty Frag" Local Privilege Escalation
Mitigation Steps
Tailwind Resource Group · May 2026
Get the Full Advisory
Sign up to receive the full PDF report.
Request received
We'll review your request and email the advisory to you shortly.