๐จ ๐ก๐ฒ๐ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ฑ๐๐ถ๐๐ผ๐ฟ๐: ๐๐ถ๐ฟ๐๐ ๐๐ฟ๐ฎ๐ด (๐๐ฉ๐-๐ฎ๐ฌ๐ฎ๐ฒ-๐ฐ๐ฏ๐ฎ๐ด๐ฐ & ๐๐ฉ๐-๐ฎ๐ฌ๐ฎ๐ฒ-๐ฐ๐ฏ๐ฑ๐ฌ๐ฌ)
Two newly disclosed ๐๐ช๐ฏ๐ถ๐น ๐ฌ๐ฆ๐ณ๐ฏ๐ฆ๐ญ ๐ท๐ถ๐ญ๐ฏ๐ฆ๐ณ๐ข๐ฃ๐ช๐ญ๐ช๐ต๐ช๐ฆ๐ด โ collectively known as Dirty Frag โ impact specific ๐๐ฃ๐๐ฒ๐ฐ/๐ซ๐๐ฅ๐ ๐ฝ๐ฎ๐ฐ๐ธ๐ฒ๐ ๐ต๐ฎ๐ป๐ฑ๐น๐ถ๐ป๐ด ๐ฝ๐ฎ๐๐ต๐ in Linux.
What does this mean for RELIANOID users?
โ ๐ฅ๐๐๐๐๐ก๐ข๐๐ ๐น๐ผ๐ฎ๐ฑ ๐ฏ๐ฎ๐น๐ฎ๐ป๐ฐ๐ถ๐ป๐ด ๐ฑ๐ฒ๐ฝ๐น๐ผ๐๐บ๐ฒ๐ป๐๐ ๐ฎ๐ฟ๐ฒ ๐ก๐ข๐ง ๐ฎ๐ณ๐ณ๐ฒ๐ฐ๐๐ฒ๐ฑ
โ ๏ธ Deployments using Network > VPN or custom IPsec VPN configurations should review exposure immediately
In our latest technical advisory, we explain:
๐ What Dirty Frag is and how it works
๐ก๏ธ Which RELIANOID deployments may be impacted
โ๏ธ How to verify if your system is using affected IPsec modules
โ Immediate mitigation recommendations
๐ฆ Patch availability in EE > 8.5
๐๐๐๐ช๐ง๐๐ฉ๐ฎ ๐จ๐ฉ๐๐ง๐ฉ๐จ ๐ฌ๐๐ฉ๐ ๐ซ๐๐จ๐๐๐๐ก๐๐ฉ๐ฎ. ๐พ๐๐๐๐ ๐ฎ๐ค๐ช๐ง ๐๐ญ๐ฅ๐ค๐จ๐ช๐ง๐ ๐ฃ๐ค๐ฌ.
๐ Read the full advisory here: https://www.relianoid.com/resources/knowledge-base/troubleshooting/linux-kernel-vulnerabilities-cve-2026-43284-and-cve-2026-43500-dirty-frag/
#CyberSecurity #LinuxSecurity #DirtyFrag #CVE202643284 #CVE202643500 #LinuxKernel #IPsec #VPN #LoadBalancing #ApplicationDelivery #RELIANOID











