• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Open source

New Linux Zero-Day Flaw ‘Dirty Frag’ With Root Access To All Major Distributions

Akinola Ajibola by Akinola Ajibola
May 8, 2026
in Open source, Security
Share on FacebookShare on Twitter

With just one command, a new Linux zero-day exploit called “Dirty Frag” seems to enable local attackers to take over the majority of major Linux distributions.

An important and Local Privilege Escalation (LPE) vulnerability chain in the Linux kernel called “Dirty Frag” gives any unprivileged local user immediate, deterministic root privileges.

The Linux kernel’s algif_aead cryptographic algorithm interface enabled this local privilege escalation almost nine years ago, according to security researcher Hyunwoo Kim, who revealed it earlier today and published a proof-of-concept (PoC) hack.

The xfrm-ESP Page-Cache Write vulnerability and the RxRPC Page-Cache Write vulnerability are two distinct kernel weaknesses that Dirty Frag uses to modify protected system files in memory without authorization and accomplish privilege escalation.

Furthermore, Dirty Frag attacks the fragment field of a different kernel data structure, even though it is in the same class as the Dirty Pipe and Copy Fail Linux vulnerabilities.

Kim stated that as with the previous copy fail vulnerability, Dirty Frag likewise allows immediate root privilege escalation on all major distributions, and it chains two separate vulnerabilities. The bug class that includes Dirty Pipe and Copy Fail is expanded by the case Dirty Frag. The kernel does not panic when the exploit fails, the success rate is extremely high, and no race condition is necessary because it is a deterministic logic issue that does not rely on a timing window.”

Numerous Linux distributions, including Ubuntu, Red Hat Enterprise Linux, CentOS Stream, AlmaLinux, openSUSE Tumbleweed, and Fedora, are impacted by this kernel privilege escalation and have not yet been patched. 

After an embargo on full public disclosure was breached on May 7, 2026, when an unconnected third party independently published the exploit, Kim released the full Dirty Frag documentation and a PoC exploit with distribution maintainers’ consent. There is presently no fix or CVE because the embargo has been breached. This Dirty Frag document is being released following discussion with the maintainers on linux-distros@vs.openwall.org and with their permission, according to Kim.

Linux users can use the following command to eliminate the susceptible esp4, esp6, and rxrpc kernel modules in order to protect systems from attacks; however, it should be noted that this will disrupt AFS distributed network file systems and IPsec VPNs: 

The Linux distro maintainers are still releasing patches for “Copy Fail,” another root privilege escalation vulnerability that is currently being actively used in attacks, at the time of this new zero-day revelation.

Last Friday, CISA had added CopyFail to its Known Exploited Vulnerabilities (KEV) Catalogue, requiring government entities to safeguard their Linux machines by May 15, a two-week deadline. The U.S. cybersecurity agency had cautioned at the time that the kind of vulnerability that were present were serious dangers to the government organization and is a common attack vector for malevolent cyber actors.  “Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.” 

Another root-privilege escalation vulnerability, known as Pack2TheRoot, was discovered in April by Linux distributions. It had been present in the PackageKit daemon for ten years.

The update as of May 8, 09:58 EDT, shows that the two page-cache write vulnerabilities that Dirty Frag chained have been granted CVE IDs: CVE-2026-43284 for the xfrm-ESP vulnerability and CVE-2026-43500 for the RxRPC vulnerability. 

Related Posts:

  • microsofts-surface-duo-dualscreen-androi-5f1f3d057e8c350ae07dd862-1-jul-28-2020-15-24-20-poster
    Microsoft Patch Tuesday Fixes 63 Bugs, 1 Zero-Day
  • chrome1
    Google Warns 3.5 Billion Chrome Users Of High-Risk Update
  • skynews-google-chrome-logo_6753346
    Google Chrome To Debut Support for ARM64 Linux This Spring
  • bluehammer-will-dormann
    BlueHammer Windows Exploit Exposes Microsoft Bug…
  • shutterstock_chatgpt
    Researchers Warn ChatGPT Crawler May Cause DDoS…
  • android
    Google Patches 107 Flaws Including 2 Android Zero-Days
  • pos2412
    Linux Mobile OS Postmarket 25.06 Adds New Device Support
  • Microsoft SharePoint CTA
    Microsoft Warns of Critical SharePoint Zero-day…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: dirty fragLinuxsecurityvulnerability
Akinola Ajibola

Akinola Ajibola

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Amazon Spins Up A Shopping‑First Version Of Alexa For All US Customers May 13, 2026
  • Data and Fintech Lift MTN Rwanda Back to Profit in Q1 2026 May 13, 2026
  • Perceptron Mk1 AI Model Shakes Up Video Analysis Market with Massive Cost Advantage May 13, 2026
  • Google’s Gemini-powered ‘Rambler’ Dictation comes to Gboard, Raising Pressure on Voice Startups May 12, 2026
  • ‘Daybreak’: OpenAI Launches Cybersecurity Push to Rival Anthropic’s Glasswing May 12, 2026
  • Google Links First-Ever Zero-Day Discovery to AI-Assisted Hacking May 12, 2026
  • Googlebooks: Google’s Android-Powered AI Laptops Are Coming This Year May 12, 2026
  • TikTok Launches In-App Travel Booking Service ‘TikTok GO’ in the US May 12, 2026
  • GitLab Opens Voluntary Layoffs as It Reshapes for AI Era May 12, 2026
  • Instructure Reaches Deal With Hackers After Twin Breaches Of Canvas Platform May 12, 2026
  • TikTok Rolls Out Ad-Free Subscription Plan In UK May 11, 2026
  • WhatsApp Plus Launches On iOS With Premium Features May 11, 2026

Browse Archives

May 2026
MTWTFSS
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.