BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Linux ‘Dirty Frag’ Vulnerability Unpatched

  • A new, unpatched Linux kernel vulnerability dubbed Dirty Frag enables local privilege escalation to root.
  • The flaw chains two Page-Cache Write bugs and has a high success rate, affecting major distributions like Ubuntu and RHEL.
  • A working proof-of-concept exploit is available, and mitigation involves blocking specific kernel modules until patches are released.

On May 8, 2026, security researcher Hyunwoo Kim disclosed a serious new local privilege escalation vulnerability in the Linux kernel, reported to maintainers just days earlier. Dubbed Dirty Frag, the flaw threatens most Linux distributions by allowing a local user to gain full root access.

- Advertisement -

This vulnerability is described as a successor to the actively exploited Copy Fail bug. “Dirty Frag is a case that extends the bug class to which Dirty Pipe and Copy Fail belong,” the researcher explained in a technical write-up.

It works by chaining the xfrm-ESP and RxRPC Page-Cache Write vulnerabilities. Consequently, the exploit does not depend on a timing race and has a very high success rate without causing kernel panic.

Successful exploitation impacts systems including Ubuntu 24.04.4, RHEL 10.1, and Fedora 44. The xfrm-ESP bug was introduced in a January 2017 commit, while the RxRPC bug came from a June 2023 commit.

However, the xfrm-ESP exploit requires creating a namespace, which Ubuntu blocks via AppArmor. Meanwhile, the RxRPC module is not included in distributions like RHEL but is loaded by default on Ubuntu.

- Advertisement -

By chaining the two, the blind spots cover each other across different environments. AlmaLinux said the bug decrypts directly over externally-backed pages, exposing or corrupting plaintext.

Adding urgency, a working proof-of-concept can gain root in a single command. Consequently, a mitigation involves blocking the esp4, esp6, and rxrpc modules until official patches are available.

It is worth noting that Dirty Frag works regardless of the algif_aead module’s status. Therefore, systems with the Copy Fail mitigation are still vulnerable to this new attack.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Poll: US Voters Ready to Switch Parties for Crypto Clarity

A new survey from HarrisX reveals 52% of registered US voters support the CLARITY...

Block Rises 8% After Q1 Earnings Beat Despite Bitcoin Loss

Block posted a surprise 25.68% earnings beat, with Q1 EPS of 85 cents surpassing...

Coinbase Posts Loss as Crypto Markets Weaken

Coinbase reported a Q1 2026 loss of $1.49 per share, missing analyst expectations for...

Treasury Demands Binance Compliance Amid $1B Iran Flow Reports

The US Treasury Department privately demanded Binance comply with a monitoring program tied to...

Ivanti EPMM Zero-Day Exploited, CISA Issues Order

A new, actively exploited flaw (CVE-2026-6973) in Ivanti Endpoint Manager Mobile allows authenticated admins...

Must Read

12 Hosting Providers To Buy VPS With Bitcoin: An Expert Guide for 2026

You need a VPS. You want to pay with Bitcoin. Simple enough, right?Not quite. The market for crypto VPS = VPS hosting that accepts...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading