SUSE local privilege escalation “Dirty Frag” CVE-2026-43284
SUSE has released a security update for the Linux kernel addressing the previously disclosed “Dirty Frag” vulnerabilities.
The issue allows a local, non-privileged operating system user to potentially gain elevated privileges on affected systems under specific conditions. Only local operating system users are affected, no PRISMAproduction users. On a default installed PRISMAproduction Server the related kernel modules esp4|esp6|rxrpc are not loaded, resulting in this system not being affected.
To ensure the security of PRISMAproduction, an operating system update is necessary. The following vulnerability is fixed by a security update for SLES 15 SP7 (PRISMAproduction V6.5):
The system update is available through normal channels. Please contact your Service Engineer for further details.
