Back to VulnFeed / CVE-2026-43284
root@hackertop:~/vulnfeed/CVE-2026-43284#
CVE-2026-43284 MEDIUM LPE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

Linux Kernel up to 6.6.137/6.12.86/6.18.27/7.0.4 xfrm skb_splice_from_iter privilege escalation

Kernel 13d ago Impact pending confirmation
LIFECYCLE
5.3 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.6.137/6.12.86/6.18.27/7.0.4 (Operating System). This issue affects the function skb_splice_from_iter of the component xfrm. Upgrading to version 6.6.138, 6.12.87, 6.18.28 or 7.0.5 eliminates this vulnerability. Applying the patch 50ed1e7873100f77abad20fd31c51029bc49cd03/b54edf1e9a3fd3491bdcb82a21f8d21315271e0d/71a1d9d985d26716f74d21f18ee8cac821b06e97/52646cbd00e765a6db9c3afe9535f26218276034 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
Root Cause Analysis
Impact: Impacted is confidentiality, integrity, and availability.

Countermeasure: Upgrading to version 6.6.138, 6.12.87, 6.18.28 or 7.0.5 eliminates this vulnerability. Applying the patch 50ed1e7873100f77abad20fd31c51029bc49cd03/b54edf1e9a3fd3491bdcb82a21f8d21315271e0d/71a1d9d985d26716f74d21f18ee8cac821b06e97/52646cbd00e765a6db9c3afe9535f26218276034 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-43284 · CVSS 5.3 · Active Threat