Dirty Frag Vulnerability Made Public Early: Root Privilege On All Distributions

Written by Michael Larabel in Linux Security on 7 May 2026 at 08:08 PM EDT. 68 Comments
LINUX SECURITY
One week after the Copy Fail vulnerability, a new Linux local privilege escalation bug has been made public. This time around there are no patches or CVEs yet for this "Dirty Frag" vulnerability as the embargo was broken early and thus the security researcher went ahead and published earlier than anticipated.

Dirty Frag allows local users to elevate to root on all major distributions. Linux distributions aren't yet patched though there is a workaround for those interested, but for the immediate future it means root privilege escalaton on all major distributions.

Dirty Frag lives within the decryption fast paths of the esp4, esp6, and rxrpc kernel code.

The quick workaround to remove the modules in which the vulnerabilties occur can be done safely for most systems with:
sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true"

More details on Dirty Frag via the oss-security posting. This GitHub repository has more details on Dirty Frag.

Dirty Frag


Alma Linux is among the first Linux distributions out with early patches for testing.
Related News
About The Author

Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 20,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. He can be followed via Twitter, LinkedIn, or contacted via MichaelLarabel.com.

Popular News This Week