<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[CVE-2026-43284 &#x2F; &quot;Dirty Frag&quot; .. Antoher one of those nasty local-privilege-escallations.]]></title><description><![CDATA[<p>CVE-2026-43284 / "Dirty Frag" .. Antoher one of those nasty local-privilege-escallations.</p><p>Quickfix for Centos/Fedora based systems: </p><p>printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' &gt; /etc/modprobe.d/dirtyfrag.conf &amp;&amp; rmmod esp4 esp6 rxrpc 2&gt;/dev/null; true</p><p>Caution: That also effectively disables IPSEC and AFS client support. But it can easily be reverted by removing the file when a patched kernel arrives.</p><p><a href="https://burningboard.net/tags/dirtyfrag" rel="tag">#<span>dirtyfrag</span></a> <a href="https://burningboard.net/tags/cve_2026_43284" rel="tag">#<span>cve_2026_43284</span></a> <a href="https://burningboard.net/tags/security" rel="tag">#<span>security</span></a> <a href="https://burningboard.net/tags/centos" rel="tag">#<span>centos</span></a> <a href="https://burningboard.net/tags/fedora" rel="tag">#<span>fedora</span></a> <a href="https://burningboard.net/tags/redhat" rel="tag">#<span>redhat</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/c28029e1-11e4-4869-8a46-a5ba61535db7/cve-2026-43284-dirty-frag-..-antoher-one-of-those-nasty-local-privilege-escallations.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 01:54:15 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/c28029e1-11e4-4869-8a46-a5ba61535db7.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 08 May 2026 20:31:41 GMT</pubDate><ttl>60</ttl></channel></rss>