Pmm.putty PDocsCybersecurity
Related
How to Audit Your Production LLM Guardrails Using the Viral Jailbreak Technique4 Must-Attend Cybersecurity and AI Talks in 2026Perimeter Collapse: How Edge Decay Is Driving the Next Wave of BreachesGermany Surges to Top of European Cyber Extortion List With 92% Leak SpikeHow to Mitigate Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability (CVE-2026-20182)Weekly Cyber Threat Roundup: Key Breaches and Vulnerabilities (April 27)Fortifying the npm Supply Chain: New Threats and Practical DefensesHow to Achieve Machine-Speed Defense: A Step-by-Step Guide to Automating Modern Cybersecurity

New Linux 'Dirty Frag' Exploit Escalates to Root—No Fix Available for Most Distros

Last updated: 2026-05-09 10:40:57 · Cybersecurity

Critical Linux Kernel Exploit 'Dirty Frag' Gives Attackers Root Access—Patches Lag Behind

A newly discovered Linux kernel exploit, dubbed Dirty Frag, allows local users to gain unrestricted root access by chaining two separate vulnerabilities. Security researcher Hyunwoo Kim (v4bel) reported the threat to the linux-distros mailing list, but the exploit was publicly released the same day by an unnamed third party, undermining the intended five-day embargo.

New Linux 'Dirty Frag' Exploit Escalates to Root—No Fix Available for Most Distros
Source: itsfoss.com

“The disclosure went wrong,” Kim told reporters. “We expected time for distros to prepare patches, but the exploit code is now public. Most distributions are unprotected.”

Dirty Frag is the second major privilege escalation (privesc) exploit to emerge in less than a week, following Copy Fail, which exploited an older logic flaw. The new attack modifies in-memory copies of system files without altering the disk version—meaning filesystem integrity checks detect nothing wrong.

How Dirty Frag Works

Dirty Frag leverages two distinct flaws:

  • CVE-2026-43284 (xfrm-ESP Page-Cache Write) – targets /usr/bin/su and replaces its memory image with one that spawns a root shell.
  • CVE-2026-43500 (RxRPC Page-Cache Write) – targets /etc/passwd and empties the root password field, allowing PAM to accept a blank password.

Neither vulnerability works alone on every system. The first requires a user namespace, which Ubuntu’s AppArmor often blocks. The second depends on the rxrpc.ko kernel module, absent from most distros’ default builds. However, by chaining them, the exploit covers all major distributions.

“Ubuntu ships the rxrpc module by default, making it especially vulnerable,” noted Kim. “But the combination works across the board.”

Background

Dirty Frag belongs to a family of page-cache manipulation attacks that corrupt in-memory file representations. These attacks bypass signatures and filesystem audit logs because disk content remains untouched.

The previous exploit, Copy Fail, had targeted the same underlying mechanism via an older logic flaw. Dirty Frag uses new code paths, and the blacklist mitigation recommended for Copy Fail—blocking the algif_aead module—offers no protection.

New Linux 'Dirty Frag' Exploit Escalates to Root—No Fix Available for Most Distros
Source: itsfoss.com

What This Means

For administrators, the immediate risk is severe: any local user (or a remote attacker who first gains limited access) can execute Dirty Frag to become root without triggering typical alarms. The exploit is trivial to weaponize once the proof-of-concept is adapted.

“Organizations should treat this as a critical security incident,” said a cybersecurity analyst at a major vulnerability research firm. “Unless you are running AlmaLinux, which has released test patches, you currently have no official fix.”

Ubuntu’s parent company, Canonical, issued mitigation guidelines, but as of this writing no stable kernel update is available for most distributions, including Debian, Fedora, and RHEL.

What You Can Do Now

Until official patches arrive, experts recommend blacklisting the three kernel modules involved: esp4, esp6, and rxrpc. The following command accomplishes this and clears the page cache:

sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; echo 3 > /proc/sys/vm/drop_caches; true"

This also removes any tampered in-memory copies that might already be present. Additionally, monitor vendor channels for kernel updates and plan an immediate reboot once patches are applied.

As the exploit proliferates, the window for proactive defense is closing. Kim urges users to “treat this as a zero-day—patch as soon as your distro releases a fix, and apply the module blacklist now.”