Linux kernel "Dirty Frag" vulnerability (CVE-2026-43284, CVE-2026-43500)
ServerPilot has applied mitigations to all servers for
the Linux kernel vulnerability known as Dirty Frag.
This vulnerability in the Linux kernel’s esp4, esp6, and rxrpc modules allows
local privilege escalation and affects all Linux distributions, including Ubuntu.
The Linux kernel’s esp4 and esp6 modules provide
the Encapsulating Security Payload (ESP) protocol used for IPsec.
These modules are rarely used on servers hosting web applications.
The Linux kernel’s rxrpc module provides
the RxRPC protocol used for AFS, a distributed file system.
This module is rarely used.
Affected Ubuntu releases
The vulnerability affects all Ubuntu releases.
What we have done
ServerPilot has applied the recommended mitigation to all servers
by configuring servers to not load the esp4, esp6, and rxrpc modules.
Servers that are not in a healthy state may not have had the mitigation applied. See below for how to verify the mitigation was applied to a server.
What Ubuntu has done
As of May 8, 2026, Ubuntu has not yet released a patch for the vulnerability.
Ubuntu will likely release a patch for the vulnerability soon.
Servers that have automatic updates enabled (the ServerPilot default) and that are running Ubuntu releases that still receive updates will automatically install the updated package(s) when they are available.
Servers that are not in a healthy state may not be able to install the updated package(s).
What you should do
Confirm the server still receives updates from Ubuntu
Servers running Ubuntu 20.04 or earlier do not receive updates from Ubuntu unless the server is running the paid version of Ubuntu called Ubuntu Pro.
If a server is running Ubuntu 20.04 or earlier and is not running Ubuntu Pro, you should upgrade the server to Ubuntu 22.04 or later.
To determine which Ubuntu release a server is running, either view the server’s OS Info in the ServerPilot dashboard or run the following command on the server:
cat /etc/lsb-releaseConfirm ServerPilot’s mitigation was applied
To confirm ServerPilot’s mitigation was applied, SSH into your server and run the following commands:
if [ -f /etc/modprobe.d/serverpilot-disable-esp4-esp6.conf ]; then echo "File exists"; else echo "File does not exist"; fiif [ -f /etc/modprobe.d/serverpilot-disable-rxrpc.conf ]; then echo "File exists"; else echo "File does not exist"; fiIf the output from the above command is File exists repeated twice,
the mitigation was applied.
Manually apply the mitigation
If you need to manually apply the mitigation,
SSH into your server as root and run the following commands:
echo "install esp4 /bin/false" >>/etc/modprobe.d/serverpilot-disable-esp4-esp6.confecho "install esp6 /bin/false" >>/etc/modprobe.d/serverpilot-disable-esp4-esp6.confecho "install rxrpc /bin/false" >>/etc/modprobe.d/serverpilot-disable-rxrpc.confContact support
If you have questions about your server, please contact support.