Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Linux Kernel Vulnerability Exposes Root Access Risk

Linux Kernel Vulnerability Exposes Root Access Risk

Posted on May 8, 2026 By CWS

Details have come to light about a significant local privilege escalation (LPE) vulnerability affecting the Linux kernel, named Dirty Frag. This flaw has emerged as a follow-up to the Copy Fail vulnerability (CVE-2026-31431), which has been actively exploited. The issue was reported to Linux kernel maintainers on April 30, 2026.

Understanding the Dirty Frag Vulnerability

Dirty Frag is gaining attention as it can provide root privileges on a wide range of Linux distributions by exploiting the xfrm-ESP Page-Cache Write vulnerability alongside the RxRPC Page-Cache Write vulnerability. Security researcher Hyunwoo Kim highlighted the deterministic nature of this bug, which does not rely on race conditions, ensuring a high success rate without causing kernel panic.

The exploit can elevate privileges for an unprivileged local user across various distributions such as Ubuntu 24.04.4, RHEL 10.1, openSUSE Tumbleweed, CentOS Stream 10, AlmaLinux 10, and Fedora 44. The vulnerabilities exploited by Dirty Frag date back to code commits from January 2017 and June 2023.

Technical Mechanisms of Dirty Frag

The xfrm-ESP Page-Cache Write vulnerability arises from the IPSec (xfrm) subsystem, offering attackers a method to overwrite kernel page cache. However, utilizing this exploit requires creating a namespace, a process blocked by Ubuntu’s AppArmor. Here, the RxRPC Page-Cache Write vulnerability becomes crucial, as it bypasses the need for namespace creation but depends on the inclusion of the rxrpc.ko module, which is not common in all distributions.

Kim explains that chaining these vulnerabilities can cover each other’s limitations. ESP exploits are effective where namespace creation is possible, while RxRPC exploits function on systems like Ubuntu, where namespace creation is restricted but the rxrpc.ko module is available.

Advisories and Mitigation Measures

CloudLinx has issued advisories noting that the vulnerability resides in the “ESP-in-UDP MSG_SPLICE_PAGES no-COW fast path”, accessible via the XFRM user netlink interface. The bug affects the decryption paths of esp4, esp6, and rxrpc, compromising plaintext security.

A working proof-of-concept (PoC) exists, allowing attackers to gain root access with a single command. Until patches are released, it is advised to blocklist the esp4, esp6, and rxrpc modules to prevent their usage. This can be done using the command:

sudo sh -c "printf 'install esp4 /bin/falseninstall esp6 /bin/falseninstall rxrpc /bin/falsen' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true"

Future Outlook

Despite similarities with Copy Fail, Dirty Frag can be exploited irrespective of the presence of the algif_aead module, rendering existing mitigations insufficient. As the cybersecurity community works towards a solution, users are urged to apply the recommended blocklists to safeguard their systems.

The Hacker News Tags:AlmaLinux, CentOS, Cybersecurity, Dirty Frag, Fedora, kernel vulnerability, Linux, LPE exploit, openSUSE, RHEL, root access, Ubuntu

Post navigation

Previous Post: Ivanti Releases Critical Zero-Day Patch for EPMM
Next Post: Claude Extension Flaw in Chrome Risks AI Takeover

Related Posts

How Continuous Exposure Management Transforms Security Operations How Continuous Exposure Management Transforms Security Operations The Hacker News
Can your SOC Save You? Can your SOC Save You? The Hacker News
Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger The Hacker News
Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence The Hacker News
Cloud Password Managers Face Security Challenges Cloud Password Managers Face Security Challenges The Hacker News
Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Claude Extension Flaw in Chrome Risks AI Takeover
  • Linux Kernel Vulnerability Exposes Root Access Risk
  • Ivanti Releases Critical Zero-Day Patch for EPMM
  • Critical Vulnerabilities Patched in Next.js and React
  • Critical Linux Vulnerability ‘Dirty Frag’ Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Claude Extension Flaw in Chrome Risks AI Takeover
  • Linux Kernel Vulnerability Exposes Root Access Risk
  • Ivanti Releases Critical Zero-Day Patch for EPMM
  • Critical Vulnerabilities Patched in Next.js and React
  • Critical Linux Vulnerability ‘Dirty Frag’ Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark