Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Linux Kernel Vulnerability Exposes Root Access Risk

Linux Kernel Vulnerability Exposes Root Access Risk

Posted on May 8, 2026 By CWS

Details have come to light about a significant local privilege escalation (LPE) vulnerability affecting the Linux kernel, named Dirty Frag. This flaw has emerged as a follow-up to the Copy Fail vulnerability (CVE-2026-31431), which has been actively exploited. The issue was reported to Linux kernel maintainers on April 30, 2026.

Understanding the Dirty Frag Vulnerability

Dirty Frag is gaining attention as it can provide root privileges on a wide range of Linux distributions by exploiting the xfrm-ESP Page-Cache Write vulnerability alongside the RxRPC Page-Cache Write vulnerability. Security researcher Hyunwoo Kim highlighted the deterministic nature of this bug, which does not rely on race conditions, ensuring a high success rate without causing kernel panic.

The exploit can elevate privileges for an unprivileged local user across various distributions such as Ubuntu 24.04.4, RHEL 10.1, openSUSE Tumbleweed, CentOS Stream 10, AlmaLinux 10, and Fedora 44. The vulnerabilities exploited by Dirty Frag date back to code commits from January 2017 and June 2023.

Technical Mechanisms of Dirty Frag

The xfrm-ESP Page-Cache Write vulnerability arises from the IPSec (xfrm) subsystem, offering attackers a method to overwrite kernel page cache. However, utilizing this exploit requires creating a namespace, a process blocked by Ubuntu’s AppArmor. Here, the RxRPC Page-Cache Write vulnerability becomes crucial, as it bypasses the need for namespace creation but depends on the inclusion of the rxrpc.ko module, which is not common in all distributions.

Kim explains that chaining these vulnerabilities can cover each other’s limitations. ESP exploits are effective where namespace creation is possible, while RxRPC exploits function on systems like Ubuntu, where namespace creation is restricted but the rxrpc.ko module is available.

Advisories and Mitigation Measures

CloudLinx has issued advisories noting that the vulnerability resides in the “ESP-in-UDP MSG_SPLICE_PAGES no-COW fast path”, accessible via the XFRM user netlink interface. The bug affects the decryption paths of esp4, esp6, and rxrpc, compromising plaintext security.

A working proof-of-concept (PoC) exists, allowing attackers to gain root access with a single command. Until patches are released, it is advised to blocklist the esp4, esp6, and rxrpc modules to prevent their usage. This can be done using the command:

sudo sh -c "printf 'install esp4 /bin/falseninstall esp6 /bin/falseninstall rxrpc /bin/falsen' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true"

Future Outlook

Despite similarities with Copy Fail, Dirty Frag can be exploited irrespective of the presence of the algif_aead module, rendering existing mitigations insufficient. As the cybersecurity community works towards a solution, users are urged to apply the recommended blocklists to safeguard their systems.

The Hacker News Tags:AlmaLinux, CentOS, Cybersecurity, Dirty Frag, Fedora, kernel vulnerability, Linux, LPE exploit, openSUSE, RHEL, root access, Ubuntu

Post navigation

Previous Post: Ivanti Releases Critical Zero-Day Patch for EPMM
Next Post: Claude Extension Flaw in Chrome Risks AI Takeover

Related Posts

Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale The Hacker News
The Hidden Risk of Orphan Accounts The Hidden Risk of Orphan Accounts The Hacker News
Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More The Hacker News
Webinar on Securing AI Agents Against Cyber Threats Webinar on Securing AI Agents Against Cyber Threats The Hacker News
OpenAI Addresses Malicious Axios Incident in macOS Apps OpenAI Addresses Malicious Axios Incident in macOS Apps The Hacker News
DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • RansomHouse Claims Responsibility for Trellix Cyber Breach
  • Claude Extension Flaw in Chrome Risks AI Takeover
  • Linux Kernel Vulnerability Exposes Root Access Risk
  • Ivanti Releases Critical Zero-Day Patch for EPMM
  • Critical Vulnerabilities Patched in Next.js and React

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • RansomHouse Claims Responsibility for Trellix Cyber Breach
  • Claude Extension Flaw in Chrome Risks AI Takeover
  • Linux Kernel Vulnerability Exposes Root Access Risk
  • Ivanti Releases Critical Zero-Day Patch for EPMM
  • Critical Vulnerabilities Patched in Next.js and React

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark