Vulnerability in Linux Kernel Affects Shared skb Fragments
CVE-2026-43284

7.8HIGH

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
8 May 2026

Badges

πŸ”₯ Trending nowπŸ“ˆ TrendedπŸ“ˆ Score: 5,640πŸ‘Ύ Exploit Exists🟑 Public PoC

What is CVE-2026-43284?

CVE-2026-43284 is a vulnerability found in the Linux kernel, specifically impacting how shared socket buffers (skb) handle data during the encryption and decryption processes in network packets. The flaw arises from the manner in which the xfrm transport layer processes ESP (Encapsulating Security Payload) packets within UDP (User Datagram Protocol). When shared skb fragments are spliced from a pipe, they may be incorrectly marked, allowing for certain operations to modify packet data directly in-place without copying. This poses a risk as it could enable unauthorized decryption of sensitive information, essentially allowing attackers to manipulate data within the packet without proper ownership checks. The potential for exploiting this vulnerability could lead to data leakage and weaken the overall security of systems utilizing the Linux kernel.

Potential impact of CVE-2026-43284

  1. Data Leakage: Due to the improper handling of shared skb fragments, there’s a risk of sensitive information being decrypted and accessed by unauthorized entities, leading to potential data breaches.

  2. Integrity Compromise: Attackers could exploit this vulnerability to modify data in transit, potentially leading to compromised integrity of network communications, affecting the reliability of data transmission across systems.

  3. Increased Attack Surface: The vulnerability expands the attack vectors against systems leveraging the Linux kernel for networking, which could be targeted by malicious actors to disrupt services or gain unauthorized access to resources.

Affected Version(s)

Linux cac2661c53f35cbe651bef9b07026a5a05ab8ce0

Linux cac2661c53f35cbe651bef9b07026a5a05ab8ce0

Linux cac2661c53f35cbe651bef9b07026a5a05ab8ce0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • πŸ“ˆ

    Vulnerability started trending

  • Vulnerability published

  • Vulnerability Reserved

.