<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with cve202643284]]></title><description><![CDATA[A list of topics that have been tagged with cve202643284]]></description><link>https://board.circlewithadot.net/tags/cve202643284</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 20:49:57 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/cve202643284.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[CVE-2026-43284 &#x2F; &quot;Dirty Frag&quot; .. Antoher one of those nasty local-privilege-escallations.]]></title><description><![CDATA[CVE-2026-43284 / "Dirty Frag" .. Antoher one of those nasty local-privilege-escallations.Quickfix for Centos/Fedora based systems: printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' &gt; /etc/modprobe.d/dirtyfrag.conf &amp;&amp; rmmod esp4 esp6 rxrpc 2&gt;/dev/null; trueCaution: That also effectively disables IPSEC and AFS client support. But it can easily be reverted by removing the file when a patched kernel arrives.#dirtyfrag #cve_2026_43284 #security #centos #fedora #redhat]]></description><link>https://board.circlewithadot.net/topic/c28029e1-11e4-4869-8a46-a5ba61535db7/cve-2026-43284-dirty-frag-..-antoher-one-of-those-nasty-local-privilege-escallations.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/c28029e1-11e4-4869-8a46-a5ba61535db7/cve-2026-43284-dirty-frag-..-antoher-one-of-those-nasty-local-privilege-escallations.</guid><dc:creator><![CDATA[larvitz@burningboard.net]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Apparently there&#x27;s yet another #LinuxKernel Local Privilege Escalation #vulnerability.]]></title><description><![CDATA[@harrysintonen yesterday I read that one should not drop caches in a production system. I don’t know if that recommendation was just for performance or if all hell could break loose.]]></description><link>https://board.circlewithadot.net/topic/e4a4f600-38d3-4e94-a30e-b66c89e78aa2/apparently-there-s-yet-another-linuxkernel-local-privilege-escalation-vulnerability.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/e4a4f600-38d3-4e94-a30e-b66c89e78aa2/apparently-there-s-yet-another-linuxkernel-local-privilege-escalation-vulnerability.</guid><dc:creator><![CDATA[labanskoller@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>