HomeIntelligenceBrief
VULNERABILITY BRIEF🔴 Critical Vulnerability

Dirty Frag Linux Kernel Privilege‑Escalation Vulnerability Exposes Root Access Across Major Distributions

A newly disclosed Linux kernel flaw, dubbed Dirty Frag, enables an unprivileged local user to gain root privileges on Ubuntu, RHEL, Fedora, AlmaLinux and CentOS Stream. The exploit chains two page‑cache write bugs, is deterministic, and a working proof‑of‑concept is already public, creating urgent third‑party risk for any organization relying on vulnerable kernels.

LiveThreat™ Intelligence · 📅 May 08, 2026· 📰 securityaffairs.com
🔴
Severity
Critical
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
4 recommended
📰
Source
securityaffairs.com

Dirty Frag Linux Kernel Privilege‑Escalation Vulnerability Exposes Root Access Across Major Distributions

What Happened — Researchers disclosed “Dirty Frag,” an unpatched Linux kernel flaw that lets an unprivileged local user obtain full root privileges on Ubuntu, RHEL, Fedora, AlmaLinux, and CentOS Stream. The exploit chains two page‑cache write bugs (xfrm‑ESP and RxRPC) and a public proof‑of‑concept is already circulating.

Why It Matters for TPRM

  • Deterministic logic bug with a high success rate makes rapid, silent compromise possible.
  • Affected distributions power critical workloads in cloud, SaaS, and on‑prem environments, expanding the attack surface of third‑party providers.

Who Is Affected — Cloud‑hosted services, SaaS platforms, managed IT providers, and any organization running vulnerable Linux kernels (e.g., finance, healthcare, media).

Recommended Actions — Inventory Linux assets, verify kernel versions, prioritize patching once an official fix is released, and apply temporary mitigations (e.g., restrict unprivileged user access, disable vulnerable subsystems).

Technical Notes — The vulnerability exploits a deterministic page‑cache write logic error, independent of the “Copy Fail” mitigation. It does not rely on timing windows, making exploitation reliable. No CVE number assigned yet; the flaw builds on prior issues CVE‑2022‑27666 (xfrm‑ESP) and a 2023 RxRPC bug. Source: Security Affairs

📰 Original Source
https://securityaffairs.com/191847/hacking/dirty-frag-a-new-linux-privilege-escalation-vulnerability-is-already-in-the-wild.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.