Skip to content
Tech News
← Back to articles

New Linux 'Dirty Frag' zero-day gives root on all major distros

read original get Linux Kernel Security Book → more articles
Why This Matters

The discovery of the Dirty Frag zero-day vulnerability highlights a significant security risk across major Linux distributions, enabling attackers to escalate privileges to root with a single command. This flaw underscores the urgent need for timely patches and increased vigilance in Linux security management, impacting both developers and end-users. As the vulnerability affects widely used systems, its exploitation could lead to widespread compromises if not promptly addressed.

Key Takeaways

A new Linux zero-day vulnerability, named Dirty Frag, allows local attackers to gain root privileges on most major Linux distributions with a single command.

Security researcher Hyunwoo Kim, who disclosed the flaw earlier today and published a proof-of-concept (PoC) exploit, says this privilege escalation flaw was introduced roughly nine years ago in the Linux kernel's algif_aead cryptographic algorithm interface.

Dirty Frag works by chaining two separate kernel flaws, the xfrm-ESP Page-Cache Write vulnerability and the RxRPC Page-Cache Write vulnerability, to modify protected system files in memory without authorization and achieve privilege escalation.

Also, while Dirty Frag belongs to the same class as the Dirty Pipe and Copy Fail Linux vulnerabilities, it exploits the fragment field of a different kernel data structure.

The vulnerability has yet to receive a CVE-ID for tracking and affects a wide range of Linux distros, including Ubuntu, Red Hat Enterprise Linux, CentOS Stream, AlmaLinux, openSUSE Tumbleweed, and Fedora, which have not yet received patches.

"As with the previous Copy Fail vulnerability, Dirty Frag likewise allows immediate root privilege escalation on all major distributions, and it

chains two separate vulnerabilities," Kim said.

"Because it is a deterministic logic bug that does not depend on a timing window, no race condition is required, the kernel does not panic when the exploit fails, and the success rate is very high."

Dirty Frag demo (Hyunwoo Kim)

​Kim released complete Dirty Frag documentation and a PoC exploit with distribution maintainers' agreement after an embargo on full public disclosure was broken on May 7, 2026, when an unrelated third party independently published the exploit.

... continue reading