Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Linux kernel dirty flag LPE exploit allows root access across major distributions

Why my doctor won’t call me back

Hacker claims to have hacked another organization and defaces school login page

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Linux kernel dirty flag LPE exploit allows root access across major distributions
Identity

Linux kernel dirty flag LPE exploit allows root access across major distributions

By May 8, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rabi LakshmananMay 8, 2026Linux / Vulnerabilities

Details have emerged about a new unpatched local privilege elevation (LPE) vulnerability affecting the Linux kernel.

The vulnerability, known as Dirty Frag, is said to be a successor to Copy Fail (CVE-2026-31431, CVSS score: 7.8), a recently disclosed LPE flaw affecting the Linux kernel that has since been exploited in the wild. This vulnerability was reported to Linux kernel maintainers on April 30, 2026.

“Dirty flags are a class of vulnerabilities that achieve root privileges on most Linux distributions by chaining together the xfrm-ESP page cache write vulnerability and the RxRPC page cache write vulnerability,” security researcher Hyunwoo Kim (@v4bel) said in the article.

“Dirty Frag is an extension of the bug class to which Dirty Pipe and Copy Fail belong. Because it is a deterministic logic bug that does not rely on timing windows, there is no need for race conditions, the kernel does not panic if the exploit fails, and the success rate is very high.”

Successful exploitation of this flaw could allow unprivileged local users to gain elevated root access on most Linux distributions, including Ubuntu 24.04.4, RHEL 10.1, openSUSE Tumbleweed, CentOS Stream 10, AlmaLinux 10, and Fedora 44.

According to researchers, the xfrm-ESP page cache write vulnerability was introduced in a source code commit made in January 2017, and the RxRPC page cache write vulnerability was introduced in June 2023. Interestingly, the same January 17, 2017 commit was the root cause behind another buffer overflow (CVE-2022-27666, CVSS score: 7.8) that had mixed impacts. Linux distribution.

The xfrm-ESP page cache write is rooted in the IPSec (xfrm) subsystem and provides an attacker with a 4-byte store primitive, like a copy fail, to overwrite a small amount in the kernel’s page cache.

However, this exploit requires an unprivileged user to create a namespace, a step that is blocked by Ubuntu via AppArmor. In such an environment, xfrm-ESP Page-Cache Write cannot be triggered. This is where the second exploit, RxRPC Page-Cache Write, comes into play.

“RxRPC Page-Cache Write does not require permission to create namespaces, but the rxrpc.ko module itself is not included in most distributions,” Kim explained. “For example, the default build of RHEL 10.1 does not ship with rxrpc.ko. However, on Ubuntu, the rxrpc.ko module is loaded by default.”

“By chaining the two variants together, the blind spots are covered by each other. In environments where user namespace creation is allowed, the ESP exploit runs first. Conversely, on Ubuntu, where user namespace creation is blocked but rxrpc.ko is built, the RxRPC exploit works.”

CloudLinx said in its own advisory that the flaw exists in “ESP-in-UDP MSG_SPLICE_PAGES no-COW fast path” and is reachable via the XFRM usernet link interface.

“This bug exists in the in-place decryption fast path for esp4, esp6, and rxrpc. Paged fragments where the socket buffer is not privately owned by the kernel (for example, pipe pages attached via splice(2)/sendfile(2)/MSG_SPLICE_PAGES) , the receiving path decrypts directly on those externally backed pages, exposing or corrupting the plaintext that an unprivileged process still has a reference to,” AlmaLinux said.

Adding to the urgency is the release of a working proof of concept (PoC) that can be exploited to gain root with a single command. Until a patch is available, we recommend that you blocklist the esp4, esp6, and rxrpc modules to prevent them from loading.

sudo sh -c “printf ‘install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n’ > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true”

It’s worth mentioning here that even though Dirty Frag has some overlap with Copy Fail, it can be exploited regardless of whether the Linux kernel’s algif_aead module is enabled.

“Note that the dirty flag can be triggered regardless of whether the algif_aead module is available,” the researchers said. “In other words, Linux is still vulnerable to dirty flags even on systems with publicly known copy failure mitigations (algif_aead blacklist) in place.”


Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhy my doctor won’t call me back

Related Posts

Ivanti EPMM CVE-2026-6973 Active exploit allows RCE to grant administrator-level access

May 7, 2026

PCPJack Credential Stealer exploits five CVEs to spread like a worm across cloud systems

May 7, 2026

“Patient Zero” Webinar on Eliminating Stealth Breaches

May 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Linux kernel dirty flag LPE exploit allows root access across major distributions

Why my doctor won’t call me back

Hacker claims to have hacked another organization and defaces school login page

Elon Musk’s lawsuit exposes OpenAI’s safety record

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.