LIVE NEWS
  • Award for scientist who brought space to millions
  • Ukraine officials name Zelenskyy’s ex-chief of staff as a suspect in money-laundering probe
  • Ray Dalio Says Bitcoin Fails as Safe Haven And Saylor Fired Back
  • Citrix moves secure access to a flexible, credit-based consumption model
  • Nvidia CEO Jensen Huang isn’t part of Trump’s China trip
  • US in closely guarded talks to open new bases in Greenland
  • This $30 Nuclear Stock Could Be Your Ticket to Millionaire Status
  • US, partner nations sink two decommissioned ships during Exercise Balikatan
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Dirty Frag: Unpatched Linux vulnerability delivers root access
Cybersecurity

Dirty Frag: Unpatched Linux vulnerability delivers root access

primereportsBy primereportsMay 9, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Dirty Frag: Unpatched Linux vulnerability delivers root access
Share
Facebook Twitter LinkedIn Pinterest Email


A week after Copy Fail, another Linux local privilege escalation vulnerability dubbed “Dirty Frag” has been revealed, along with a PoC exploit.

What is Dirty Frag

In effect, Dirty Frag refers to two flaws:

  • A xfrm-ESP Page-Cache Write vulnerability (CVE-2026-43284, aka Copy Fail 2.0), now patched in the Linux kernel, affects the modules supporting one of the protocols used for IPsec
  • A RxRPC Page-Cache Write vulnerability (CVE number reserved: CVE-2026-43500), currently unpatched, affects the modules that provide support for RxRPC, a protocol used for the AFS distributed file system.

Vulnerability researcher Hyunwoo Kim (aka “V4bel”) privately reported both flaws to the Linux kernel maintainers on April 29-30, 2026, and submitted patches for them to the mailing list for Linux kernel networking development (“netdev”).

On May 7, he submitted detailed information about the vulnerabilities and the exploit to the private, members-only mailing list used for coordinating security vulnerability disclosure across Linux distributions.

That same day, “an unrelated third party” published the details and the exploit for one of the flaws so, “after obtaining agreement from distribution maintainers,” Kim got the go-ahead to fully disclose Dirty Frag.

The consequence of the third-party leak during the embargo period is that CVE-2026-43500 has yet to be patched in the Linux kernel, and fixes haven’t been made available to users of various affected Linux distributions: Red Hat Enterprise Linux, AlmaLinux, Debian, Ubuntu, Fedora, Arch Linux, CentOS, CloudLinux, Amazon Linux, and others.

Patches in the works, mitigations available

“An interesting factor of Dirty Frag is that chaining the two sub-vulnerabilities covers each other’s blind spots,” SANS ISC handler Yee Ching Tok explained.

“As described in [Hyunwoo Kim’s] write-up, neither the xfrm-ESP Page-Cache Write nor the RxRPC Page-Cache Write alone provides a sufficiently reliable primitive for full root escalation. However, when combined, the chained exploit achieves immediate root on most distributions.”

The various Linux distros are working furiously on implementing the fixes into new Linux kernel image packages and releasing them.

In the meantime, since the PoC exploit(s) are now publicly available, users and admins are advised to mitigate the risk of exploitation by:

  • Blacklisting / preventing the loading of the affected modules
  • Unloading them if they are in use

This action may affect workloads that depend on them, though.

After patched kernel packages are released, installed, and systems rebooted, the mitigations should be reversed.

It may be too soon to hear reports of Dirty Frag being leveraged by attackers, but they will undoubtedly surface soon enough: a PoC exploit for Copy Fail was published on April 29, and CISA added the flaw to its Known Exploited Vulnerabilities catalog on May 1.

“If you have not yet addressed Copy Fail (CVE-2026-31431), now would be a good time to treat both vulnerabilities as a combined remediation effort, given their similarity and overlapping mitigation steps,” Tok noted.

Dirty Frag: Unpatched Linux vulnerability delivers root access

Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

Dirty Frag: Unpatched Linux vulnerability delivers root access

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleShortage of Merchant Marines means big money for new grads : NPR
Next Article LayerZero Admits Mistake in 1/1 DVN Setup Tied to $292M Kelp Hack
primereports
  • Website

Related Posts

Cybersecurity

Citrix moves secure access to a flexible, credit-based consumption model

May 12, 2026
Cybersecurity

Google spotted an AI-developed zero-day before attackers could use it

May 11, 2026
Cybersecurity

TrickMo Variant Routes Android Trojan Traffic Through TON

May 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20265 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Award for scientist who brought space to millions
  • Ukraine officials name Zelenskyy’s ex-chief of staff as a suspect in money-laundering probe
  • Ray Dalio Says Bitcoin Fails as Safe Haven And Saylor Fired Back
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.